Analysis
-
max time kernel
30s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 19:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shield.dhalumals.com/?kbdgyxjjwv=YkhWamFXNWtZUzVuZFhSb2NtbGxRR0ZqZFhKcGN5NWpiMjA9
Resource
win10v2004-20250314-en
General
-
Target
https://shield.dhalumals.com/?kbdgyxjjwv=YkhWamFXNWtZUzVuZFhSb2NtbGxRR0ZqZFhKcGN5NWpiMjA9
Malware Config
Signatures
-
Detected microsoft outlook phishing page 2 IoCs
flow pid Process 108 832 msedge.exe 108 832 msedge.exe -
A potential corporate email address has been identified in the URL: [email protected]
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc pid Process 108 https://outlook.office365.com/owa/prefetch.aspx 832 msedge.exe -
flow pid Process 108 832 msedge.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\gl\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_400_955830848\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping400_1508683196\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876620700628194" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{075A05B0-0DD0-4894-919F-CABA8244A5EB} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 3628 400 msedge.exe 86 PID 400 wrote to memory of 3628 400 msedge.exe 86 PID 400 wrote to memory of 832 400 msedge.exe 87 PID 400 wrote to memory of 832 400 msedge.exe 87 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 5508 400 msedge.exe 89 PID 400 wrote to memory of 2696 400 msedge.exe 88 PID 400 wrote to memory of 2696 400 msedge.exe 88 PID 400 wrote to memory of 2696 400 msedge.exe 88 PID 400 wrote to memory of 2696 400 msedge.exe 88 PID 400 wrote to memory of 2696 400 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://shield.dhalumals.com/?kbdgyxjjwv=YkhWamFXNWtZUzVuZFhSb2NtbGxRR0ZqZFhKcGN5NWpiMjA91⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ffa6214f208,0x7ffa6214f214,0x7ffa6214f2202⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Detected microsoft outlook phishing page
- Mark of the Web detected: This indicates that the page was originally saved or cloned.
- Detected potential entity reuse from brand MICROSOFT.
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2276,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2492,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3380,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4896,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4452,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5308,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5524,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4828,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6352,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6360 /prefetch:82⤵PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6324,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=4900,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6424,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=3496,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6432 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=6100,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5412,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=3984 /prefetch:82⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5256,i,8532433904905251050,14261194385274523716,262144 --variations-seed-version --mojo-platform-channel-handle=6408 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2508
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD560d40d2b37759323c10800b75df359b8
SHA1f5890e7d8fc1976fe036fea293832d2e9968c05c
SHA256c3a2f26d5aef8b5ed1d23b59ed6fce952b48194bed69e108a48f78aec72126e0
SHA5120c339563594cc9f930a64903281589886308d4412ee267e976520a58d86b2c339d7b2320e1b3fd6fbf81f092ff1735f0710c669af2986ea5b63d2c1e0a6df902
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD535dce15d5954dfeed3904644485fa311
SHA102326dc89dce96ac417ba20e33ee2de676927af6
SHA2566051df69ae9073a40dab7619da50118d7faf8b32838edc3dd10eb9529cb7ac2d
SHA5122ad70c6cdd6e018e4b79438d0a5b99fbd940b510e52f01426137beed901227d3f464f131c92ad93106e5625d9bbc596f47388a62f19f8f1160824b7e7ff86ae1
-
Filesize
36KB
MD558a0a876b94b506fc15cafa341571130
SHA14e3252850aa044292c1dc5690382b26f620ea0e1
SHA25626671bc229e46f438a22ffe254880d546f45183fdcff7abaec4dd46be8e4d33b
SHA51215e55be6bbcc11b6d5b7cef4fa878cab45fd1ed3248dd42a7a6e5b5202b053be021f83ff5361f224fb5071d7b485cc0115a42c1c193d2ecc9dad37c213e569fe
-
Filesize
22KB
MD5ffb235fe007a0ec5fe692142d8cad3a7
SHA18f8a90674befba09e0c01826743084a6e8661a0d
SHA2563485f226cd4b47b19a4db53fd498ad0082df52089426b1d50d8cfa66160cc13e
SHA5124d0d30080d3f078d1e95cb722b8175a0dea5deffa40be34d6259b421992f8029c28a91c1da0de83efd67c9476262fc0240419e4c792f98f8d5c3e7c4f15fef42
-
Filesize
40KB
MD56758ed8451985aabed02f97d6a9fd720
SHA11c47d3722ce63ac495e6e9e524e2a156ffc71213
SHA25631b96cc6fd56b21f6aa72bbf6da8cf031122465b2d97e624e8155935858e0e25
SHA512f5c65d9aae816475b0f35c7380dd3941ef5c0a15c670554a6d68cb8567b1fc588112513d66069b6d165dedac9c5f90e2c98ead0df69db0731ce4bc6c3dc85083
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
40KB
MD54fb6e995c588088c3dd7c40208df0a22
SHA1318d92e48be3e702695de431774e980b787c9db6
SHA256b4f1231723478ec706af905fde5d4c5c09c2c1e36f1f0c146128bca39dc63768
SHA5126fa3d1e4e5b40375c180eff48054890cc019c652a5c43c31b0cc8a7b8433406de518efff99a81a104263dc51bda5674bea63c06ef473795cc0597cf77076bba9
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5a7ee003b72292fae69a5d3909b38be6d
SHA1d8cb50e3a73d6b5a5d338c3eae1c388b1e57d729
SHA2563b24fcf93d7d59d2d5a31315f95437df293efdaf6b6949611f5dfd1f4f15293b
SHA512aca80a912d75dd2045a135306e132bb649217121f41bbfe1e5a41534158e939c4ecd11e06879fc3f493acccc0b42d7b18fda0a3bfaf805b178370e07a4306495