Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 20:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://discord.com
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
http://discord.com
Resource
win11-20250313-en
General
-
Target
http://discord.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 12 discord.com 22 discord.com 5 discord.com 6 discord.com 7 discord.com 8 discord.com 11 discord.com -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\pt_PT\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\en_US\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\es\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2005584536\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\no\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\en_GB\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\az\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_1570978487\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2005584536\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2005584536\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_1912586006\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_1912586006\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_1912586006\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\kk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\gl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\zh_CN\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\it\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\fr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\fi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\lv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\de\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\fa\messages.json msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ar\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\hr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ka\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\zh_TW\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\sk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\uk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1420_2014625857\_locales\ml\messages.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876687519642211" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1216697136-3907990103-1733992739-1000\{7EE79C5C-8AAA-4AC0-8CA3-BC102630AF2D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 msedge.exe 224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 936 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1488 1420 msedge.exe 83 PID 1420 wrote to memory of 1488 1420 msedge.exe 83 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4960 1420 msedge.exe 85 PID 1420 wrote to memory of 4960 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 84 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87 PID 1420 wrote to memory of 5092 1420 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://discord.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x264,0x7ffa7147f208,0x7ffa7147f214,0x7ffa7147f2202⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2032,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1676,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=2464 /prefetch:112⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2572,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=2436 /prefetch:132⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3372,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3380,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4728,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4620,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=4528 /prefetch:122⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4972,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:142⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5140,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:142⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5588,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:142⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5644,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5704 /prefetch:142⤵PID:6052
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11323⤵PID:1980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5724,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5748 /prefetch:142⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5724,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5748 /prefetch:142⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6284,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:142⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6576,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6300 /prefetch:142⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:142⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6468,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6492 /prefetch:142⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:142⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3360,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:142⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6300,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=5464 /prefetch:142⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5164,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6448 /prefetch:142⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5572,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:142⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6544,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6024 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5564,i,5594728008903124119,7200302518780960745,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:142⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4736
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004DC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5ae987eb15fd5136f2fa707a7b1f18abb
SHA1bc4aa67ba8692031bfead4b653fc6fefaee3dbbb
SHA256f5e0e4ee660e95e1c4f64d5aa134aacf9f7fa1a9b9cfaad10f5b57b24d331d1e
SHA512fb98d55c498ab80b1f7886b56d0e652e648666bfb13c61c20d495dfb9f2e473e24821efc48f103fb0705e199e56b3e23a0bca82c0296d690104eb0d79032c0f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5408e61b58b394e50f7237d50aeca8763
SHA14a71bd16ff4a68c36adf0460a34491768ab82106
SHA256027582413827fec7dcf3aedca9d11fc7b9d18be28310baea8367cc02dffcf9ac
SHA51239bdd9febf05d51727afe8d7a80372318205826fc430435faf948a4572af89ec22822482babe4ff3552859effcc677b02f55a19fd56e0a08cde5751b0eeffc3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57bf49.TMP
Filesize3KB
MD502f674ac2547a7b02fedf7011e292494
SHA1be615de3f0c68eef715d6577fcaedc25315d3418
SHA2564415435cbaad9c35492ba3dc70cb122089d72ff82aaddba1438a1c11a27404f7
SHA51299359d6de069d3defee088b3406775aeda1bcd867993ee3d356cb8e68aede291905eefc7d744782a61ae7b442972872446cd130ee74794d6c6da5cd96b3d4ea8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
4KB
MD5a8030bb8756de258d61148b5a40cf041
SHA16e91129876e50c50689c5fa6034889da2eaacb87
SHA2569d20bf2108900c56d3ec4e637ed350fca38c87881e7931694221840baa9a8ae4
SHA5124ea968bc8a909b9af2630cb3c7249a3bee6a94bdc1d381c76ce4ddd0a8bf3ba19ec7bfc1a4e148f631c82c85b2d72fb82b3af6db303d81ee9cf795070fa053b7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
18KB
MD5028b53b759c276b4119f1739ac6cb128
SHA16ede9ca3863281b056c2bdbd40c40a04bb444eb3
SHA25693d449f7468f3458e9f81778280090e2dfd0808bc51ac4d1d3ff3e6e3acfc941
SHA512bb11c9ddb4f7a96479993a8c515c947e09f6c16ba9892ac06343e61ec4dd241a32d061cad823f6e9b62918673aba59ab9b271e0c4bc75c9269d1054bfab32ef8
-
Filesize
17KB
MD52d55cc40cfdf771c817472e85ba74ae3
SHA15a880df6d6b79a8d42140737aabfe49454571162
SHA25699c8beb8c34976438c952c828231539b78f604c161b872a59ef386b95d2e40fa
SHA5124e21cf9cd4bbe6a2eabd57ba232be08e88c6356178d1a61d0853ab6ac24701940b90c4385e62f2958713c6dcbb04bff348dfbf8e86afa2540a3c78ee4e907311
-
Filesize
37KB
MD53436ba30ebbc8b78737b69e7ae70ccc6
SHA10bd62b3806c4bc29ebd9723d46ef4c85387726c3
SHA2564b4b43dd454658c5a372a5aaa73a578ed574cebd321e5aa843aa8a2bafe1b77f
SHA512a036388bf54cf32dcc4e0403734e288477c79b9562d31697ca61c86ede715af75f710694a5fa5dd5e0fbac28fed519819ac7b5e877b1da309a4377970cb2633f
-
Filesize
22KB
MD56f2b9ba737a12801bcbab7f3847aed80
SHA1e6ec618b25b9a70effc4e1dee2205152115a5d2e
SHA256f80c379b0fcbd581d6e0b605ee4f7159025582a3e4921a6dcf35dfaf5588f5ec
SHA512061d0469816c440eb864085d8f3f7779a6962a46dbc53b7632ab113f656cd2356a76964dda91b6d925789c39e519571232b01bb04e87bd566d50d98a04b9a57f
-
Filesize
904B
MD5d222c2658c0b3e4a851517bb9f146583
SHA1069b211350c4b6a900f11d1446f28e7166a721ab
SHA25692530a960633c3536ca3487d8be8cb7057835c387593a6baebb8fedc7f314f58
SHA51219876ece73febbb714b9b7a1bd655a4d4308fe72af6c7407a1079eb70da67f089fc5017a491d55add06ca812d91cddca82a9adf3c3dfd95898fd8bfcab55274c
-
Filesize
469B
MD507186f20c23d65d6b41337ab3af7359e
SHA1f6a13edf28afbf098fe3eaa14f65239cc72ac8f9
SHA256c304464c3f1d6897b4a45a700adbeb39b44e3db02911da9987976fa25a08f496
SHA512cd861f1f6ed6ca280b28692fddaf51e47b1d844ef890e228b4cf4af0f25149ba310e70ff8c60bb44f79a0a00c072bf946f0e123787909c4d58ece394fdbcfd96
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\c4ce68c4-1955-408b-9543-be6fd43eeb0d.tmp
Filesize23KB
MD516e7a0f54a9fd43c602f6be26ffb9971
SHA15f8b1e52f6accd6d191b14faed5a9d5c3426b10a
SHA25622a3005cce1daebfd2a2da946913769af28d93463b1372a31b600e2ea2bdc12f
SHA5124914274d5ca5612979e809d365109283be07c042e42cf1cebf88a70fa737cffbc6278d21d9728e3d6c6d9016f285327e01af4eebba837c37e6196d6d8a433ea3
-
Filesize
54KB
MD5f10b4b221f5c93b76fd35bf261f99c49
SHA1c9bfc8811c9c63449bfbc1a41ff507d477936b29
SHA2565c358c6d46ea88829999a1ece5ead7281314f34184ef43f1f9514da3ba48ff01
SHA512395815b1b304df3709c4d8363f96b83757b690a23da22fd02a61e4f93b3efa285944de8d4a8a63c3de4abdf09a7f9a4a90200cb0c7036225de6816daaab527d1
-
Filesize
49KB
MD567d25716fae3d177b5b552c071e487dc
SHA1ec20f72cb813267a6bdb12761bbeafa181b7402c
SHA256c6abf0ad55f31c835549908f741b91f72ce0b31a5fb939c894b7f955189d2922
SHA5128bb9a5ffc39b84827586d04ba3140cc74722dea05172ba85370f474697df26b8abfcabd1cc522ed073de3e183906db218fcd1c4bc29cba3164cda1b72e18aa0c
-
Filesize
40KB
MD58319ed8abd93610c157dcb87df0761af
SHA1df0f6b9b36ba294fbcd1a647385b6077d1fb8494
SHA2561b42dd9730dd6303c316896698ee95bdfd7f1e9feaa26b1385af2065e4f6abde
SHA512823ea39601dbd26f8b1cadf91a844c34be0701215b1eef74e58e9ad6b4b30caedc5ab1c0ae221cb5d0d572eba2305c08bcb1ed7d39b9de7f51b5b476197db13b
-
Filesize
40KB
MD550ba317877489df80b5e65a8f8dbc1ad
SHA1c40e68325b94b2d35a3085f12f84b47fca736840
SHA256f6590f25f015d743c251e02d7e8af3fe51221332bca797f3d436ea3ceba26902
SHA512e47621fec9e7468e379c8a5c25116e478430f32858d441347bfd54dbd7ec04212197218122469f963a9bc2151f1ca6b65d7a29a3cb0cac5755b33e26b7184d85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360