Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 18:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bing.com/search?q=install+virus+on+computer&FORM=R5FD1
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
https://www.bing.com/search?q=install+virus+on+computer&FORM=R5FD1
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
https://www.bing.com/search?q=install+virus+on+computer&FORM=R5FD1
Resource
win11-20250313-en
General
-
Target
https://www.bing.com/search?q=install+virus+on+computer&FORM=R5FD1
Malware Config
Signatures
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_1169248840\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_219717565\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_1169248840\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_440771174\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\de\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ne\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_1169248840\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_1169248840\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\no\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\fi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\128.png msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_1611493751\protocols.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_219717565\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ko\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\zh_TW\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\gl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_219717565\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\zh_CN\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\kn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_219717565\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\en_US\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\it\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_1611493751\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_440771174\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\msedge_url_fetcher_3008_1008460012\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\lv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\ar\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\es\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_219717565\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3008_31680851\_locales\mn\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876613830887698" msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498259476-758239146-3116387113-1000\{CE106826-5CB7-4858-9D90-5476B104907A} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3316 3008 msedge.exe 81 PID 3008 wrote to memory of 3316 3008 msedge.exe 81 PID 3008 wrote to memory of 3764 3008 msedge.exe 82 PID 3008 wrote to memory of 3764 3008 msedge.exe 82 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 1384 3008 msedge.exe 83 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84 PID 3008 wrote to memory of 5152 3008 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.bing.com/search?q=install+virus+on+computer&FORM=R5FD11⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x28c,0x7ffa0c06f208,0x7ffa0c06f214,0x7ffa0c06f2202⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1768,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=2296 /prefetch:32⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2588,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=1988 /prefetch:82⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3516,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5064,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5304,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5124,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5112,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=3716 /prefetch:82⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5552,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5640,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5640,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6416,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5560,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5608,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6448 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5636,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3668,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6412 /prefetch:82⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5952,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5288,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3704,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5532,i,3977012857985838308,2262007548025411971,262144 --variations-seed-version --mojo-platform-channel-handle=3412 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD56c3ba40e438b794a4630cfac27b4855f
SHA1255cbd9d9013024a359b4ac1187fd0f39b89f46e
SHA25644150c3a8ecd45408e7bb17ad9cd38d3191e8ffebfb8e09f9c41b8f59620a5b2
SHA512344ad251942b3e6d2844145607029bfd2439cf5518fbc6e0e82fa6bec9f5ff391ecf38025dcddc8158591bd433b767126b2c7d520b7a97389f31aaff63f3188d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD58a5cc5f325295464b79b7ece098b1085
SHA18660db1b1efdbc0a63a4de35e8ce2fbd70be47ef
SHA2561e796d689bc911d10f39ac62d33b612f7388dff9ec483d6be17530d22291e521
SHA512f7a3e2a63f277733f6e94c1881dc0507566c32a782477b03b76dfd1452d93965c3efa7212cc3b665ffecfbfc23f243fac4fe1cd705d5c7fc1906a94f1e50037e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57f0e8.TMP
Filesize3KB
MD54e6993b05a4560b8fb91cc4d551a2ecd
SHA1763061668f79a170949326dd4c6478bc8fbcaa1b
SHA256fa9181382e493a1311065253f8519641af530b5c53d66ffe09a959a48dfbefb9
SHA5123ed0bc2ee96c8fbc85ee21ca7db04a7b26c9cd9cdf96073545dc66f0b259f4dea765e69d78ac0f6443600c589eca503be1b14a50e7d41a8c9a146b65df4dfd08
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD59185e1871a5dc05393ce2a2c4b214bec
SHA1c80ce95c509234cc733748811529ef01d1109a02
SHA256ff5d19c44945e0fd4b25c0ce21b087e103cffd924f7e5164624c25dee80f652f
SHA512fee1db5b24b59006feb8bfecacd4dd4699c3c92bc46ed8e2fcb7aab82e2102aae7dd7b47c017f3b8bd909327e5ff2a9778b099eab4880d9dfe49c119a381626e
-
Filesize
2KB
MD588359702b2b3aafbc1a692bdd3052d10
SHA11092ff1e4533e98642fad32a0a16314b7b597009
SHA256d0a5b4c471bf2de4c00d1cae41d1209af99a07a3d7b6a276bc1cdeee5f067812
SHA512cdb150646f16e8606496ea535fcdbe36a0d2fc52547d5c6d2d6bdb94d4ce421d60c4ed638c6a1cda138726b1b45083f169981d8ec5baec2baa663756b108db51
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
211B
MD5249d45f785f45e3378fee959d14ecb0c
SHA16b5e831e2d4b376d87f0833c7b5ca938041a975f
SHA256acd5b2b1e7b28beea691111089de4ee82def2bd8b3f83f20c42f26e823012484
SHA5120e81b215db50f83fba613c8b14c4c6c7d6e679b114732db9925092e175b88676ed1a01bbdd14bf09507164c054ad05c53d2ac11a322a6a85d3f6f4cfd9e4fd1f
-
Filesize
16KB
MD5f512f9bd52df73ae358860ba0f277f69
SHA1d7082672b6329f1bdda9d15e51d7e6144f35bf6b
SHA256b4bcb0107b470eb0ad20f7d3033d0ce488cde5a2f7133666b93bdcbe1ff070a0
SHA5122df24a181a599c88150333f27a1536855313e7b132efcbfdf97f9017dc57dd6342b8bd8ff3c3c592a2d209cee5bd5cb71c81ef4c2e406bb628bb7259b71eb2dc
-
Filesize
16KB
MD54d0eecaecab16139fe9c6b98f27372a0
SHA161344825f3fd0a3256d13a6775951676bd7c5970
SHA2568182b4226f47a96e45dfeeec066c8d2a617a3fc50e90e8fbad9b773839f47546
SHA5126afc83b8a7713943135800b6bed4b9a2bd8fea5b32e0f60dc5a84a75da1b13f9e8b90e9912e9488045cf93b328e4f14ae3bb5b5c3fd52644e273bd542470348d
-
Filesize
36KB
MD5bbd8c21bbee9f86719b30b4cc6b5f2d8
SHA12711f28d5e96f1d9893b2830dbe99307083f2762
SHA2564d49eebb9ecd01206eaafe9d48f0b08396465a52f53935a555a80cd4dcfdc333
SHA5128fe1c35c5c09cbfa4f67547d955073449af9781c060dc0ad33216a05af96c7264b79cad54c96e49a02518ca02dce016229e03244c83e6a84d4d0f1aad104a141
-
Filesize
22KB
MD50e992c407097690284217663b831791e
SHA1f8adad171d63e234614a5bada8332300b1f77c1f
SHA256f99b2f8cd14631e6ff57b01b78aebf666655fd6d8c32c2b45d5657be2ddd5bf7
SHA5124dc06d39910673235071ec699d4fd4d5dc8cf5634f24f83a16b343359ae4471bc7cb59c4472a07721a45baed5f102ec00b4da837a5b3541e93924a28d0a7e8a3
-
Filesize
469B
MD5b6e207c2b5b1568d25dcb2b798a2fa10
SHA1a03475477e536ad8269747e08d680ce7086dd3a8
SHA25670ec9ec37c5af0856bef46568cad7a07236e55ebca2af0756f1e70d350b4e002
SHA512967a51ab7e2cfac1cdea828ea3d163163d93a8e971512e9f6bcb822aa609e4ed4a057e6a11fd343e9375540473c35f63fa9a0da82695b6767fca18a6b83d4fd0
-
Filesize
23KB
MD5b36709bd271a9ba3a557fc0f529bd26c
SHA1a839f262a65b303dd745b27065cb4c2a9ab41277
SHA2561c14ff4c80bacd82a832d09fa3987529edf93f53aa2b00e8fb95bfc0b62388ea
SHA5121d42c740c60591e48c194fb58e4b15ec8d2d6b314fdc3ae0928575f157aca32bb479264eedf20f98fe3973a99a07a8fe5c294a6b4b8520cfdd7c833da08669cc
-
Filesize
904B
MD5279a67186afa1904047ddc2c249c5ee4
SHA1aa7ea5f5d411835ba694aa29c168730d27c7ddcb
SHA2566816c96c62d99e0bc609a927ea212b214b40849d9ddec61161a25793c8182cf5
SHA5129bc7ee9775301340ebf12f35bf1d3d522ae6861dcc444cbd7ff9ad07001b3edc02e728e6f0f3f1b7a30c156138cc615b313e9d8804efcb2b6308aa831614a1ff
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD5735d0c8fe6d7ff33aa6b9d0a1d5a9c1b
SHA1b222768d9de687e31dca4ea66e5cb81f63bcb3f5
SHA256bad1b34666b96de46732b42635295883f05adfb0a36796c0ea5c408bdc3a9a48
SHA51207f1c3b2b3adcd4372d7d2d721e90b46205bb9eb5f0649d10f81729eaa97a8c7a8d65a8f248d15767b5bebbbab6edccbf95c7727ea1d92a6bf0ea3dd309b3c06
-
Filesize
41KB
MD54bc91e44e77559e8a47c90a693a88bb2
SHA134d76816be7be09e05e6dcf718676fde62e1a4d1
SHA256e57c8f4d38b50ae11e14fabf35e49f80f613920632bd2344c218ab4faa5e1adb
SHA512b9b6ae6e6d8cb1cf682c295ddbe580fa60969cb578fbaef49ef8e93953eb6d11e64e24d18f0389f16441b739bb41a472192c243f86849010d16f304f30090ebe
-
Filesize
41KB
MD576fd1789d7c2cdae9896f5372e61ed3e
SHA1acf2ac0e10bfbfb4198dbfb1f8ac0fb6bce74530
SHA256f2039ecdd1bacd535b0b47f3c8873fbaf5a31149f2ca7d675c8a2bd995712c89
SHA5126fe3acd7509d9edb4d5429298e58b6e36d0c28693e56225e0e8eab9ff3ff23cc58eaeb1fe8ac6466ec0ecb22a7b917a59497dd308809a09543f23e7855999799
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5597bcfeb8e6408ae3962eeaa7f31ffef
SHA1d1a8df697d934f31e273b8665e7967a3cd61d649
SHA2562f4b1a99ae47720abacbf59a2e190ea3a3841fcd9f6740ec2e39d8b06e7cb3a3
SHA5121982338d546054d77c6b4675a96b3028f8faf10de2f7abdd3830029a2ac03c27370f5a4fafbca36656d7a7251b2f263cd9a94c4c9865ac4ee192385a6c407628
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c