Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 20:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/vd096ertuoudvph/SETUP.zip/file
Resource
win11-20250313-en
General
-
Target
https://www.mediafire.com/file/vd096ertuoudvph/SETUP.zip/file
Malware Config
Extracted
discordrat
-
discord_token
MTM1NTE3NjE3MDYxMzYzNzI3Mg.GfLOZG.Mix4fwAYEff7M5-ZFTjYnQ0AN56JgFEJUbug7M
-
server_id
1355176088489169088
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 2 IoCs
pid Process 1588 insatller.exe 1728 insatller.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
flow ioc 501 discord.com 155 discord.com 473 discord.com 494 discord.com 500 discord.com 471 discord.com 495 discord.com 516 discord.com 87 raw.githubusercontent.com 469 discord.com 477 discord.com 479 discord.com 465 discord.com 472 discord.com 514 raw.githubusercontent.com 515 discord.com -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_387159591\nav_config.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_387159591\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_315881243\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_215204260\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_1132604933\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_1132604933\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_387159591\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_315881243\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_315881243\office_endpoints_list.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_315881243\smart_switch_list.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_215204260\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4556_1132604933\protocols.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 44 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876691290562626" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\en-US\CachedLanguageName = "@Winlangdb.dll,-1121" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\ShowShiftLock = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409 LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\en-US LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\ASSEMBLYITEM\0X00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Keyboard Layout\Preload LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\HiddenDummyLayouts LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\Language\00000000 = "00000409" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000\CLSID = "{00000000-0000-0000-0000-000000000000}" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000\KeyboardLayout = "67699721" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000\Profile = "{00000000-0000-0000-0000-000000000000}" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\Languages = 65006e002d005500530000000000 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\ShowCasing = "1" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31} LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "25" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31} LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Keyboard Layout\Substitutes LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\en-US\0409:00000409 = "1" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\ASSEMBLYITEM\0X00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31} LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Keyboard Layout\Preload\1 = "00000409" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\LANGUAGE LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\Language LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\TIP LogonUI.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-994669834-3080981395-1291080877-1000\{CEE12692-58BE-402E-961D-898CCBC468B4} msedge.exe Key created \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ setup.exe Key created \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\SETUP.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 124 msedge.exe 124 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1380 setup.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1588 insatller.exe Token: SeDebugPrivilege 1728 insatller.exe Token: SeShutdownPrivilege 5532 LogonUI.exe Token: SeCreatePagefilePrivilege 5532 LogonUI.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5532 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1300 4556 msedge.exe 80 PID 4556 wrote to memory of 1300 4556 msedge.exe 80 PID 4556 wrote to memory of 3096 4556 msedge.exe 82 PID 4556 wrote to memory of 3096 4556 msedge.exe 82 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 1624 4556 msedge.exe 83 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84 PID 4556 wrote to memory of 4176 4556 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/vd096ertuoudvph/SETUP.zip/file1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x25c,0x7ff8c4d2f208,0x7ff8c4d2f214,0x7ff8c4d2f2202⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1688,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:112⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2152,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2496,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:132⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3448,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4112,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4128,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:92⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4156,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4188,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:92⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3652,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:142⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5544,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:142⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=5680,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5620,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5752 /prefetch:142⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:142⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6456,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:142⤵PID:4260
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11443⤵PID:2908
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4528,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:142⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4528,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:142⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6596,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6588 /prefetch:142⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6684,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:142⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6764,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:142⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6588 /prefetch:142⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4152,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7000 /prefetch:142⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7136,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7112 /prefetch:142⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7284,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7292 /prefetch:142⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7116,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7440 /prefetch:142⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=4524,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=5628,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7684 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=7768,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7836 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=7824,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7840 /prefetch:12⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=4160,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7536 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=4664,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8164 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=8168,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7224,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7240 /prefetch:142⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=7172,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8084 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8236,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8252 /prefetch:142⤵
- NTFS ADS
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=7308,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8292 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=6224,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7680,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7448 /prefetch:142⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7680,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7448 /prefetch:142⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=7668,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6748 /prefetch:12⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4256,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8376 /prefetch:142⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7196,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=7216 /prefetch:142⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4376,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:142⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6792,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8196 /prefetch:142⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7572,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=8380 /prefetch:142⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=764,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6360 /prefetch:142⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2124,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:142⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5988,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6796 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6304,i,15462579966985511263,8105144367573991073,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:142⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1532
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6096
-
C:\Users\Admin\Desktop\setup.exe"C:\Users\Admin\Desktop\setup.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1380
-
C:\Users\Admin\Desktop\hacking\insatller.exe"C:\Users\Admin\Desktop\hacking\insatller.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
C:\Users\Admin\Desktop\hacking\insatller.exe"C:\Users\Admin\Desktop\hacking\insatller.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa39e2055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c4915f5546d95ffeec60455267cb8491
SHA15ea32fd86aaef190b4ed125d5f956b5b6c2e6e2a
SHA25677804cbabdc25c2a9574a84e4f4c299754b181b785cd0e49f5169dbda4ea1014
SHA51224f7ab8e933f2202af3a5d55c5c04465eb151679f5a0bd8b6f23e2423b4d436374bb3207c1d172615f1d966a22da41b88476511e4441fe5c2b915b53f6c624a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD502cf1313b32a8ab2f031cee39bee8fc3
SHA1861cc0ab9ff881460dd6433e37075b822aac9355
SHA2567e7fd13903a8d57f314d9e7dab6fa28975050b63f045eb315e96cccaa17d1e61
SHA512f5464c94391bfb590f6755c2ae6896dd459a2a93d778601caebf272438c2ff127ec5de81dcf8efeec65a56609558477afc7be1c4993977a18fde7b915f7a8700
-
Filesize
280B
MD5a7746999f724961ab727817a88ce0349
SHA1297a68d075dabbc9492539645126756a644c4e33
SHA256dab1efccbc700f22bc871e5e948493f18001a98200ffbcce26ffbb0d77d3b42d
SHA512231d694f835b5f107445ba7dddda64cec60b989bb18172d9c43a9836257ffe5a165bdf56500614b5d010c592d037bedb6b21f728e43da40b0b699960220efc4c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD520566b18a4c9af4dfd31c07ad91fe295
SHA160937074829c884465a565ac7a522371931ff23e
SHA256c41c4c5d02535c5e6e08a65723adc85db0eda8c89bfb8fa0c3adb9196069195a
SHA51228ed3febd9945f9640ef55cb8d87566acc53b32f2fc2bd7256e9feb6eccc4af46115ef03ee764b131f1554209276dfbed7a086131811642405f723d4367fd613
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD59bce53b28edeadded9b33d5a73d24ae3
SHA14c8fabdd91f740112a2598739daea6f600de82e5
SHA2567e224f2f6b082db6bfd257790822db94cc5c2af2ad1bc556fd3fdd08c091347b
SHA512c0f488f801f3383456f90096b2fd64dba7f656123295a801a484c309162835b41d5ba7eee918f1bf7b6ffda7cf7de4f1daa9104a102dd784fd32363ee4bde670
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58509c.TMP
Filesize2KB
MD5b63546abae91c2010f3595672bc26b18
SHA19ba9422031287d88baa4e2bda776ec96ffce8df8
SHA2563494046b7a45b991b9b477fabb9b053a0c6767b9f8c76c00816d704df9c1a17d
SHA51205aa58c3b4198d4a7bc2c8f9187df48b22bd352f528da0c5f1488824721e126062c45ac7e58518a53fdf5a25cd01713439b397e7ea3a96aadca6d8f15612805c
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
21KB
MD55608886e20e501c9b0e3c1987f69ebd0
SHA10b8ae33da6eae2ce8692daa232fb9fca3fbdee63
SHA25647d4f2f3b276fd5164f54aea084f6d5de00e706298ec3cd6e33a11c6bb7658ec
SHA512dc0d0aaf05ea3ee697e5553db573be37161d582604f01076c59df07d1b8e9172c42aae6d38a935b6fedd18adda811cd873e700600fad0a9f775e45b31ee82a4b
-
Filesize
21KB
MD54874e27922110e88f4254cc0ca477cb8
SHA12a1ea38329060d21d20c835c2b38714f4d5d7dfa
SHA2563e29ebd51f11bf008f715298bd32877114f538f9f43c4277e42a47b6028e4467
SHA512cf6ae5d14081459ffe235529b99a94a4cc42abea8816ee92fa89aaa06a82999a3739ef7d257c9c97ea668d006569d802f5e7184bfddf8e07c83ee343fad42d39
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
21KB
MD50646f41e169274cba0791390166842e9
SHA11e7a5baacc85fb70c3d5e9a6aaa4b3d65999a336
SHA256464707f5bf089a2984a6bfee5494266f0e95bf15fa44ad30c207bc93ac1c8eba
SHA51274939fe4a8bf12e54033a41b52489e3f622abac22fb904c2b6dc83d41bea09c8f21fc88b1ce4c9ed42ed0e5cf8b083051fcb753318affaf7425ab4fb2cadddde
-
Filesize
16KB
MD559292535517402faf4c2f1b380c171a6
SHA157d2b66ecba606002300fd15d905c80575fa4d81
SHA256299b69980da7594fdca5b8a22e53f3f25dff05b7d9504a50c0837bbd0dedf6b4
SHA51242903bfcf1d7a5b60131d2cb74319272107a4a987a16989af22185ca17edadfc3e53ff60d385c345a51dcebb3e12844513a21ed5ba5cc8bcbcccea0744af3f62
-
Filesize
20KB
MD52d4bcadab735430b324325e5ca1fe983
SHA183abfd86bce15d7b16dea788943dd2aa948d4258
SHA2560729202127cd59802c78bd48e2010d4bf267c7c8c7049592d800d31508d1f1dc
SHA5124b5387cab1de4443aad93bd5c03b83da6dd5aae5841ad0bbf9c1e9b9c60978ab220c7794348c9a0b58382041fea828d5a24b1af5eadd7ff0ff83db227c451ad0
-
Filesize
21KB
MD56e0d2667a37908aac6c7c394fedeebc6
SHA1cc721059b72586dfe4e7d1050700812e4756712f
SHA256ba614babd8d7fd234c63af3cd8bc90f29118ea27562832725c74cd7e9bea9d88
SHA512297327a4d7ca9bdb5c5e5677d3944c5e645c879b79120423ee1e3a2e98f94ff686b99b05d47336de4a39e8c55661e4523cbe24961f3627b13894b5bbda251267
-
Filesize
37KB
MD56e34097fb96b987ffff334ecad5ff016
SHA1ba399580942866c3443ecd1c67fd63ad9094c896
SHA256d5779305897961c6202aa40d3933ee72b6aa337407cfee76b44dac87dc2db735
SHA512f40e2e0ac41f3ae10880ba4845506ada2e2427839560d6d0cb3f4cff33b8e59ed9e1f5d2001103461132f4db8aee60ce72a32c040d9c6fe32cfb05f85b383522
-
Filesize
1021B
MD5dd0db13fe41a2b0c1f1c4c5dd64aa736
SHA12e8ad54f2b6de8a3320133bb1004c62b5e4ac3e0
SHA256639366e80067db748e015522c80ccd5c015ac0434d8617fb8c3189c763e8f92a
SHA51225a3346841d5ae2c4443943cfc1af2dc8c3aa65174626fdb1a0818b3d72f076c729cec3677849d2cd260689adf160b75bad622aad383e79799ead9c443f96346
-
Filesize
880B
MD549424c46a31e0b65443f0709418109bd
SHA1c85a57fde1c0083f9ef30fb8677f3f630641002f
SHA256543e370a0074ead5a3090f81375d0d67a5530d3dbf2717937327ebe2271feda5
SHA51223fe66e9c0e1cff0c21803384300b9eb41cf794507ce3d9af8351ad9db31b2e7e6685e2d958bf9bf4a4b1d28e14aa3b773f850aa91b4b9764c390ad336c52c67
-
Filesize
23KB
MD564feb106d1f6f510078062d3c979514d
SHA1958a56e3df7bd65b99e07e7810dba26904cec6a0
SHA2565454fbc056a5a4ab2715d69ff50a510da062a1b8d9460da0b687b2baa6525725
SHA512c23447c965f22a6fbfb984b8a15d1d4aa49c0ac315948e5168d446fd0d8f59700055b51064084552c5323e5b990026e7629b1701c40a2d6605069b60cecaf59a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe588c0e.TMP
Filesize469B
MD5d982e6dbfed8c2429140d0e7ae1a3452
SHA1d8a4ac05eea0b230786039af63c14a1f0fb484ef
SHA2562bdcf0107e9c8fa0e38db1b560342bd95ed6856021dbe40d5d51d90098ffd7f7
SHA512310abd3157ac4759ea17125086d3c3a650796387ade1941d1ef1c8d62e25fe8df4a2334a0844c4582c50c947d8b8dc85f23ef8907e0990c3c96a9558ca76a052
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe588cf9.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD578659f772f5e5c027180e7078b1ba6cc
SHA162465e587ed9b9daf91f08b49f72f98024ddac13
SHA256f4a472ba46e4f5556ddd0777cde2d860ea174900469cf6f26bee9a6d469a2668
SHA51211ba4f13f748baea06b18cf538b3604cab3a15b5c3ca64e5a0ee1e67d834eb2dd3e98f78b1b778c8e0aecfa355cf3bcb06cfeb7e44af8fda15974f1b47f7f7fa
-
Filesize
39KB
MD581a6c04f3198b674382d428b81985e17
SHA146c7b7caa66b8b51ba26e755e8eb4b2109506a22
SHA256728cef829e0f3b76b1661562b6b0049a405308ad58f42cdd1691d7cd5c65b510
SHA51214cffdb92fb74d73f8cfeb9703294e5a33c1e2f93cab165623e141a14327149bc11aa430dbd4f755911684a6dab085daa8377b17c42075a6b2930c475b3f47f1
-
Filesize
6KB
MD59edffd13d6838e7f31367c0f1260da99
SHA1417b9c652facccfc2f25706c428d3da6a3cdbc5c
SHA256638c802ca266d15b2ef651ac1684f83678942c4cdbedae5b326b4f00770d37b6
SHA512fc01dd3fc5f14e7fd3559f0d9fe115cdf27a20ce92f77a5664aabc75c23e0c7e8cc7a74b605577e664bf4a8c85657ae97a61834142ea29f316f95394349245fb
-
Filesize
30KB
MD5fbdc286d2c12b15edc14208a8052c0ac
SHA1fd809cbe8f6c5867d61d1b8ba97f2fa8f87a9716
SHA25624addc2c167b4b5221a860af07b12988c49b879fe4f81382825be284ff9865c3
SHA512d2597e947f9f4cfd130ef036a102e558a31df85f4454b3a59039e4cccade5bc7a1c1b9c9230393e4d8c161bf2c4f2ecc80175a926b3977e25f25c270c18c64d4
-
Filesize
7KB
MD569a2244bc4f061f4d2c565eed28c2285
SHA19c4b4dd83dd2a7460006ea606c0f83b4856b1850
SHA25697dc9b6cddd1b6113a6e2ba7b8587756d372b6c944e96806c22c5b73779d1886
SHA5125caf47aa517f837388879ae4185b4534d46620fd0e9a1c9de103e3f1ddab2fcf70d5aa94a4df78dbb099464ba5e6e449652e2880796128fbe16e4e343fb9dec4
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
78KB
MD50a168387794c114bb7df52e3fe7cb356
SHA151abc37a778ef2a17a6f319735cb6d030ba06659
SHA256506c2077992b25ea91cc711f6147dbb17db6f7d039f9b7ee821a69c24bf38db1
SHA512f81072a7d86bc05da77a7442df375e6decb5b6a6224dd7149d045297c52862d1ae4257274b1bea770085ab64f39fcca54c055f60cfb10a3b4272cfce00e73f29
-
Filesize
131KB
MD5bfccfec9609d65d0883efd9805485971
SHA145dac52add12021d016687e27e0e651dad5ea994
SHA2561cc06c9db2a296297bb019a455caaa30b2ab5bafe211716df8a0b22d0f9c7f1f
SHA512a39b345e980ebc3f8abf34000d67cac6023a256352abbc5e1fce67aad7377d965c6e28e95e5fa65a2c9b8b46a9c7fe2360383ed304c8b8026955c1f2102368ec
-
Filesize
66B
MD591a932dcd7bffe18428528359af8f18f
SHA1bee30924f7cdee4b6332c7e53726c14e0e5acf36
SHA256467b8610308d08ee1a4d30fd9ed93e238352b3020d19a8417c51df22eed98b3e
SHA5120f2e141a64a55088b078d789159fde7bf407ebcd5583528a380cde89f573b104c29045dc1dd923fff562e4bbf1f710443a2ba5d617292cbd625030bcab074fc2
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2