Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:41
Behavioral task
behavioral1
Sample
dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe
Resource
win10v2004-20250313-en
General
-
Target
dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe
-
Size
5.9MB
-
MD5
4eda75adfdaf4afd6307178919a74524
-
SHA1
4573925b2e3d7ba9a7ba3b054fe537393040cca8
-
SHA256
dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0
-
SHA512
391f35f9af8ee68e4aec609bbb489549da4a7d8ecd0956079ae99c8c06ef17a2ad0b976be1abcf4a33fee4a332ac0086fa152f5d472d0ea7d09ccb570c1c8737
-
SSDEEP
98304:6tef1q5cDfiOGV3gMZeqoN+n98vdb+jgJJRTvvliUxaJUq2sovOFOYi58G:6te86eVQMcqoPvdbs0vViUxuUqgvOFOP
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe -
resource yara_rule behavioral2/memory/1052-0-0x00007FF673A30000-0x00007FF67498E000-memory.dmp themida behavioral2/memory/1052-12-0x00007FF673A30000-0x00007FF67498E000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1052 dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_872072110\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1704439477\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_573159853\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1704439477\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1704439477\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1704439477\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ru\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_4604_673008239\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_573159853\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1123986843\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_872072110\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4604_1194460762\_locales\sk\messages.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876321179687770" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{E8536A09-8783-4712-A48B-4413B7B71C5E} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4604 1052 dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe 94 PID 1052 wrote to memory of 4604 1052 dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe 94 PID 4604 wrote to memory of 4708 4604 msedge.exe 95 PID 4604 wrote to memory of 4708 4604 msedge.exe 95 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 5996 4604 msedge.exe 97 PID 4604 wrote to memory of 5996 4604 msedge.exe 97 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 4600 4604 msedge.exe 98 PID 4604 wrote to memory of 5944 4604 msedge.exe 99 PID 4604 wrote to memory of 5944 4604 msedge.exe 99 PID 4604 wrote to memory of 5944 4604 msedge.exe 99 PID 4604 wrote to memory of 5944 4604 msedge.exe 99 PID 4604 wrote to memory of 5944 4604 msedge.exe 99 PID 4604 wrote to memory of 5944 4604 msedge.exe 99 PID 4604 wrote to memory of 5944 4604 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe"C:\Users\Admin\AppData\Local\Temp\dc737ad881e596caf770af3cd0d4065e245757950cb5dee43d221e8fbb6b2ad0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pc.weixin.qq.com/2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x360,0x7ffc0ec2f208,0x7ffc0ec2f214,0x7ffc0ec2f2203⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1932,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:33⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2296,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:23⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2472,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=2904 /prefetch:83⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:13⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:13⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4924,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=4636 /prefetch:13⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3764,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:83⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3752,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5084 /prefetch:83⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5544,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:83⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5836,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5872 /prefetch:83⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5836,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5872 /prefetch:83⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5048,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:83⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:83⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5944,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:83⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5948,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5868 /prefetch:83⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5464 /prefetch:83⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5308,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:83⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:83⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5608,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:83⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4656,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=5264 /prefetch:83⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5204,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=856 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5452,i,5193665517649700164,5724529654241646318,262144 --variations-seed-version --mojo-platform-channel-handle=2460 /prefetch:83⤵PID:5348
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5c2df2aa0a9accec813be30ea210bc907
SHA1669626a26a6e92d798dfb6a896946b8e5a62b9ec
SHA2568b39eb4f1a1d7f111840076c443db7f27e701bd24b4090eb5420b00f4dad0f24
SHA5122009dfc5ffd7443d14aaf638d5c709386927d2becf6c05264bdc3e929aabeffcaaac5fd94f1011ba28667dd44c5ffdb8e48cec3977e90d8dfbe7ae3de24876a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57d37c.TMP
Filesize3KB
MD5482d7b43612cfa1aee9cf7f14a47e39b
SHA1d851e237249fbc64e2fad873c07b9c8762398853
SHA25684886e64b76825e6d9d2be6dd1de0ac3bbc137ecbd760c32e9de517a99aa8f65
SHA51269e34e1c3aa0a3c7fbaa33992a0db923b72eab36589b3bd9540627863e89340fe896af367c2a226f5a942a112407ee82562a37d8e481e2e7edc42da2383230c3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5af87e057a51719d6cb49bd05634c198c
SHA1d7fe16077538ee681abc96434f28e0eb69cf4735
SHA2565d862ae66c5d7cb0df5dbf3bdda3d73735d96648310677555b1ab01df6faa835
SHA5128d43c59ed4b4f01ddfd1f49945209bb10ccc914b662a82ff68d2a9d237600b4f89cf7d20c50c40769c50940e2dcb28a350fa14a1a4d5397ffa6e9e9769a9ec97
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\ca6d4e10-5ef4-427a-bd36-9c9562c37314.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
17KB
MD56c2f54c61bacf2d81f035839a2ebd77b
SHA19da48cd391e36519c9b4bd42cdbd64cb0a6edb97
SHA256f95f0b9031da6b6ffea2bc843705a4b44dc97448ab2ca33ae97ff7bbb348676f
SHA5128824865d72665aa778e2ac70638dc75361e354ab30d406f1496d84209254ac01817eb4cac478b449644cc4a74a612b483308b26cdd299a6c5a849f6cca2b7dd9
-
Filesize
17KB
MD5002b7df6e963cffa7108ae765f5fb5f7
SHA11f330b2b80502666c9c47ce29195661ab4752a26
SHA25627253c246b6a63f5f80fd450440fead8f1b3cd29024f1bba38ad413cb89a3755
SHA5125185c03c8729e267525caaa672071b0251d19db85e7a4dc08db3d896c5ec728580d913d4b63293d0e2de190c943838b2f965f08a259b95f849e5d1a341f6aa29
-
Filesize
36KB
MD5847fbe640f33945bad78cee535dce27c
SHA17994c818975d6796b1b610a67458db2bd7176c76
SHA25606c1b705875d58a17204f70bfd8795e0a1f087c092ae7262200ce227c1ab4f0d
SHA5126e9f892a9794c8f7541e199dc6c082ee00341e06ddc52f1f663ad9a5f1ee3c3dca8c8beccd3eff03ec114bdb106e76782112d0c2eafdf07d7013416dcad7220e
-
Filesize
22KB
MD5d9e02acb619a86b0f67796c0bdce05ce
SHA15bb89d2c3ee93428e55436bfbb48c3c28457cde6
SHA2566d95212b1701aa0b07d9142da9217e9e0af685a79fa0c78e91a549e62da5d37e
SHA5125c21b1adc751b84efa330de18a71a3c3a0a265cdf20591f43a3a1c91fa3d5fd5625b7547685dd964775e2d5421f66049a673af7daac9b5a5e1d41df92f095cac
-
Filesize
469B
MD5a36374552f33b65ad23e61740e0eabbc
SHA14b92ded0b4ec2fc08fc1a8eca13cccec73c4b1df
SHA256199f2d0d7225726d9d12dc34ef21b8355d5032ab238d827c631bfa764a7b0555
SHA5121c4ebd2a326d74b650da6f2228c82f4e76164c0023981f895f96a1cf1e6e3816040c813f9b53009d818e03bd061501ff6d35f20fe9af31022e2766ba4ad2b04b
-
Filesize
23KB
MD5710baacc1b8ff63e17b35f8bd27086e7
SHA1520fefd0980e9c3f9994f315ac041bc240299be3
SHA2562c69d721a04a160f2088c18fbba81202674bff8d33526464679b23118b47b6e9
SHA5124f6327a4b21ed9ff8bbdcc50db8f888a619fa2b8f98da8d1e031bc0077b3d38c36e786474883c13046debf9e7a91b218c727ed0e1cfbde2c7556b4d5f1bf75f1
-
Filesize
904B
MD56bf3b4c2f991bb857ed3d1dcfb03320f
SHA171976ad9894f2ef9097a552effe2a5869a9a0d47
SHA25682c6853443eab560c89a77e8333dcfc5442ef61f1e01d53fd549713cf0e240b8
SHA512b990003b90b3a30d02fe31b4e615dd7b90f1106caebc2e930027851a9d5d6eb5c9f6d497129fac7a254c779e9072efe47cdc5c46dece4f7ce5d1f685f59444ab
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD51d3ed28163902ddca718136898b4e32f
SHA109f98d492f667ab1527e4d6475444bad2fe2be57
SHA2563fe153cfd30deadaba8990712ff10cdba62a2185cbfdf0f48233bd9e9c26d3c9
SHA5125accba8d442812549aee8fe2613a4b5bfc6892f62e8ae5fc56512d822ff4e179411adca14a56bd74ca8e72dca8c94a5936fd333bde0bc174e3a5fc2c4a3d6f38
-
Filesize
40KB
MD5fa9772dd2f38c22180bb554226a39934
SHA1d8f53692c144996d7dc0be785872530f0250c0ac
SHA25601d218668621acee6a51195c65c94f540ff9a46c5cec7a45abf5dd6daa6b6590
SHA512bcf1d525cc76d45b53b22d9a6345a7b15e14230adf9962cd77908ef35186cf077696d9b44b8e08638bdb51a66b50e53ffe07f3d2d51718a30baee9c0991a93b8
-
Filesize
40KB
MD5163ca08343147b89e11145c0f172651b
SHA1aded94ac2b7341dc3ad21e223a29797faf4eeaa1
SHA256ea918ad8f69ac81b092fba7a08f6f5793e847a06cbf35cd7f2287e858666726d
SHA512b6d8b1dfd7aa30253e6bad1ecf820f68a96000be5457585d824e881b20490f75ce2a43e14f9030e730161e452020289cad9d787d8550b0ab3405975e1862faf6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5d0fe7e4b41ce9006b6a0d1c0e203aca5
SHA1041bac3f262f9193863834482b02eaf039a5cad6
SHA256d93fe87da5a8ac4c4fbeb996a6b85c7b9d1ac42edb6809899a8d0e378670feea
SHA51268bced48156ad830f067c8753619191a34a71dc60ab84891274517e120475b1cc3df812d54df076b439ab5dfea0825f9fcb578d1f4382ade249356ed54dc2389