Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 10:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://newnetworkconnectors.org
Resource
win10v2004-20250314-en
General
-
Target
http://newnetworkconnectors.org
Malware Config
Signatures
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1497012121\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1497012121\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1497012121\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1754881799\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1754881799\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1556400757\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1556400757\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_1556400757\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876326799491658" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{9C258551-B114-46FB-9310-DB7D06C191F0} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6040 msedge.exe 6040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 4964 1972 msedge.exe 86 PID 1972 wrote to memory of 4964 1972 msedge.exe 86 PID 1972 wrote to memory of 4684 1972 msedge.exe 87 PID 1972 wrote to memory of 4684 1972 msedge.exe 87 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3664 1972 msedge.exe 88 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89 PID 1972 wrote to memory of 3648 1972 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://newnetworkconnectors.org1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffd686ef208,0x7ffd686ef214,0x7ffd686ef2202⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1764,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:32⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2252,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2376,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=2492 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3512,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=2388,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4172,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:22⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5208,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5348,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5436,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5284,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3644,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3640,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=3672 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6224,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6252,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6300 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6668,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6312 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6688,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6344 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6704,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6872,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6880 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7040,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=7020 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7020,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6720 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4428,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4512,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6196 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=2752,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=2100 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=6428,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4264,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=4544,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7096,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=6988 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3768,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5496,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=3720 /prefetch:82⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=5588,i,10389070728396952600,9419947620128069145,262144 --variations-seed-version --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a8f5774729c1d356a19a2e51153c2e5f
SHA13f81fa7a3145e9f3e50217770f25b7c193b40cad
SHA25600928fde1ef6ae916814c22802c3bbef3df9c55689d5d90690669d125dccfabf
SHA51270f452da59a14ca4fd7d2745557ab71f06b5f5f54abaeb803025af80900834c44eaa75a40d471409da52f30a3a79cdacd60d626238b1fad693bf02863e568a7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57c91c.TMP
Filesize3KB
MD5ec0c0dcc33a00508d35db1dfc96356d7
SHA14e440717cb8584972b6520e55d3f0abfb3fbc5f5
SHA256fd9286acbd705cfeb4d75b70d11360c64ac0b41d24547c181ef3eebd8fd3b6d5
SHA51225296597b7673e96021571c84036833508597cbf0743b1474bfc08a6c5fac110cce30a9cdf7dc128db11a80aa9e8934dd5e855406f37af3ceab1b41ebcf88873
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5f4644b277cefd87b96c6df850b01a2af
SHA1d9c5cef5db85b736fb8f43bd75ba0483fabd8978
SHA256248bab73b227d01c7aa459efc2ec7b31ad575fe9fda795d2d5c86e838078ce79
SHA512a586559988e06f127d733e6742210a5996aa8d55891a46cd34787c70869646543ada17bd6462e1c068cf0fde6db205d2d399630b455efa85b7aaa7112f606d77
-
Filesize
1KB
MD5aae5fd322eeef99e124baac90b57e8b2
SHA192c0e9152a5c212d095693fc131b64da6ef3512a
SHA2568cfcc4555473e746266fb5f2cabadb52365c8ce5a5d47676d3f4de5f4f94567d
SHA512ac346693ff924b283c59905c60df5793c271df42c9688d00d1fbfecc2f3b2541e10e8e4a01637f4a402b04a360d6f905ba3c003a5d0742f49294261b7c991a2f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD54a6d83b8ad4c2ac340fdc5d3bc77600f
SHA12e1da98a3e2df8a3e25c0096f79809c995408756
SHA2569305756deeb07f592a4c482904b6421ed714da13b6be03e663bdbc2a5692da20
SHA512c3a5181e917dc036acc853a2089d45ee1d916a11134f3e763a2efb6ed8ebc3f90372dbbfa126c1d250f8a115a99a157d1d37c11279dcf73c1f2890521729f800
-
Filesize
14KB
MD5af4afbb3f391be77142cf52f9f142d44
SHA1e410980e6248d513deed8832a7d6642d53d3963a
SHA2564118664096e6f526b4fbf65c8f22ca4ff8e082671d7592fb278beb626946bcbb
SHA5125e00c49f58ca9d51609d7e0c5873d4a91b093e93bc15c191de5f56d65702df6d87300ce17af75f7f67d9c4e8de906bbfb444894dd968956a2c34ce5265c540d4
-
Filesize
36KB
MD52cc388cbe85171ca7df2f1113b43d943
SHA104f1046ef0a915774ea27d4e8fe2241a776a0d37
SHA256d2a9e013109bf3eb7b780c994ec12b6d6e8f4891bbaf9c7abd2b18787ac6968a
SHA51266b5b778628d1e67fb982ccf01e19815743456ba04138b44572a61ab0f189cc578bcf97f02ed7144853197dafc0627c6ba6eca2317603933b8b4474d8b636c49
-
Filesize
4KB
MD5464b4455f4095674d267bf0c42216311
SHA11906b88425cce716d3c4cc317772267d905b742c
SHA2564bbb7330bbf0e1f616b8f6350c92530b7914d6b50d45597a0b72a6d4f1a80156
SHA512a8d3dcae39d210487d555ed4cbe7b384f05302d18a078adb19a5ee2bb21883e68d07737468b4d96035470b83411e0bbbdac516d80eb561f2cae896dbd9725af1
-
Filesize
23KB
MD540894c9ef1937664b48bf1f5810d24ff
SHA1922f19491f390097ba019d0176d7639a08be5e60
SHA2561f3614b859c118d72d92587940b6884d67bb2b6e9bf3266f267ce7f52fb9c2c0
SHA51232f4ddc14f65c23226d89a9a6ec68da148e3d0210058e443cfa66687ee8e1fc3fbf5a65631eb506c8dae78f3c05b47b9daccae796afdf5ed62b81e3bd6f71d28
-
Filesize
880B
MD5a4929b49e3bb7ae146988e592f26447e
SHA190bed908a112a42cfbdc20fdc51dab136b0da6ff
SHA25653306eef2eac11dd4d2b19ba2cde58abf9a93ca6022b0a36ea384bdf1db2b2af
SHA5128367b0a755ad7b732a4ca0e5b0af1170a90fcf08e464eb4b3748117ddfb74e53a7af76b977c6f3a183390f2ee68ceab8b6c42ce7f348e349ed94099e24ce1935
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5869e0.TMP
Filesize469B
MD556304cd63d2c5f78c1baa54c164fc06b
SHA13bbdc6aa561deb6c4bf13d7ca97c17336ef06987
SHA2567951763e266a7b43713dd0cc15c39fcdb811168a5c641cf0a1f86e673f88858b
SHA51250e431dbf91d37eadabd14a685c7efc8dfc0dbb63fcee2dea9951543b7230e6a60979368ab84fc83abb1263389770eae19a804636a9b7286dde826bcaaf04f72
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe586bd4.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
Filesize
30KB
MD58c4a72a3b9eea502edf8e74318858f73
SHA171466c578b64185e93bbb42d552513008e99955f
SHA256edd5614c6a5c0ec0e7c1bfc53992b5949ff701932bf686f9387b148c9ef90891
SHA51290be2b1860030e013be09207aaa2e9e11e15ced0098b53acd8a7e8cfe3f115faf99af6a321ea098e910f70064bc815db79899d83b01c708e9cd48a7ba47760a5
-
Filesize
39KB
MD5b05fd452fe0700f3aba493fdc9f0e1a5
SHA13c5d435c5901bb4a8bf73985b8f0c5bd51abb39a
SHA256663b8d5ef33114c6699303aa11a218c8347694967fa5252b37d6c371ef3800ba
SHA51257dc3ae7b272dff234ac8677a2861b1ed03dfa5a7d522b721d4972d8bc40ca9ea8cbb746ffdc0ef065518ca3b8bf711a430bdb0a25a70a173b8b39ccc4c1a41f
-
Filesize
6KB
MD51ae1d67b33a44d88c279fd7b25c9fcd6
SHA1c49d94e551874335b716889624eefad6a4b99674
SHA256a9acdffbb9c9e6034481ebf9e3aa27be0d48cbaa5e6055b2481232ed15386413
SHA512639b97842bd50487c3f2826518c8f2cf70e72901edae1dccbb058cf6f620670166ef4edf55b7c0b854253466a429bfc988ae9b1c0c882fa707e7a2fba86a375b
-
Filesize
7KB
MD59aa295d26276b947f06b3775f011c6dc
SHA1e47d8110f7b0ed9567e148e8e3d5d6cfbb126d68
SHA256caa2746cb119cc0f8d8f8134ff70e920defdce22780041b44af736376421786a
SHA512f8a37a49fa2579bf47e653408e8bdc995f48a699dca73eb1f261ba4e514c8390ac3331d039cb279516e4044643c605f1b109cd45a609ec128e1e49af5a57cbf5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5fdc831e665fc99f200a0c3413d608d6d
SHA1e7d94f3f4a2402b650fdf4a32744a83e3214034c
SHA256b1dc896c6e41860028bf0b62f7f792eca99cd817db062ffee9e9243c0ff3a70d
SHA512455eb1030adbcde33d1266e3b5e79e3283068a42fb635320ad7821126b4555cf28a9825cc291bcd4e1322e2ae056cc916eb1a0daf0fa91eada386fdcdf08fb0a
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1972_1351611756\d00806ca-1c97-4ed6-90b7-c33e0534a479.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de