Analysis
-
max time kernel
73s -
max time network
72s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 21:29
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 64 3536 msedge.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1323745090\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\zh_TW\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\fa\messages.json msedge.exe File created C:\Windows\SystemTemp\msedge_url_fetcher_6048_692310948\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ar\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\128.png msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\lv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\et\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ko\messages.json msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\offscreendocument_main.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\vi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ne\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\az\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\en_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\de\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\en_GB\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ka\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\kn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\es\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\uk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\kk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\hr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\fi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\zh_CN\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6048_1406441453\_locales\no\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879302059875724" msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1702774510-645589634-1201277210-1000\{96407DA4-C4BA-4ABF-8B5C-BD0D62ABE151} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe 6048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6048 wrote to memory of 4660 6048 msedge.exe 81 PID 6048 wrote to memory of 4660 6048 msedge.exe 81 PID 6048 wrote to memory of 3536 6048 msedge.exe 82 PID 6048 wrote to memory of 3536 6048 msedge.exe 82 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5132 6048 msedge.exe 83 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84 PID 6048 wrote to memory of 5296 6048 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://is.gd/rRLa0N1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x23c,0x28c,0x7ffe2016f208,0x7ffe2016f214,0x7ffe2016f2202⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1868,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2124,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2580,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4788,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4808,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4976,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5676,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:5572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5996,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6004,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=6024 /prefetch:82⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6056,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=608 /prefetch:82⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4832,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=5296,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=5292,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6176,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,3988443595855782903,4464224806364752703,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4928
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5004b10499ccdef678495d126747817d4
SHA1f2613e109771ee8f435d219c0f1d09dc400ec8f5
SHA256de04bf151a1ded657ac3df0f0b30f214dfc53231f87e45a16004482cddb0bd4e
SHA51225758072a30783f0664b1ca3cafd6d35613133ab06ac69df8f482aa61a2ad2c3cd850c28334613c274bf42d99a5aa84d89a3e98e234f3a1d22abec325c5cc3b2
-
Filesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5d78c6bdde9663f352e42c981d1fd1cd1
SHA114628a5e0a33f15b277d0ccaaf27361eb935287b
SHA256fb9a6a6c92c1b5bd67aab964f10eb30d7356768b40e2486fface6a2c0182db96
SHA51269ffe39aaf37c6cddf345a09c1fada7d54b124360e6b88510dacecf000df331f567bc02b7c480f9295fdf4c7d878dd5ad8418a55ee7af47b93df6c81a91e6ab0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57b1ac.TMP
Filesize3KB
MD5fa95e3e5145734503e5498eecaa9df4d
SHA149b3690d613f19a8510bd6c7641f084deae18e32
SHA256f726caed13fd5746e609cb68116181bcfc1bc181ff4252e005b5fd250b9b0d1e
SHA512c4dc8d7a42654b156eb7ddada2e9027e13428e8424bd2454c30e98b4dff72232c56c0fd51c9ffa5bd860fcec492d618f396074c9a36ca8138e0fb8a56610b48b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
4KB
MD5de22979ba617abaa26b6c4cb860f8bbf
SHA1949f0a201caa81b7aa5b19fcafb1a3a867e34e40
SHA25629be9858adfdd07cf50a505ca98360ae02bbc626b1a62b545bbb600cafa87fc4
SHA512364aa4f765c9e33c4b9dad66e5c71c53a8534e1e4e6dd288e8f8862d79963243bdae951cbf36e7009da9a446d4f495490618803ff0f58bcc194897acd5a26f9f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5c9c230f67d870d90d3ef70fe25ff186a
SHA12f0fb8c4164bb76eb9917106d7cca102652ace11
SHA256012db2a50c40232e0652d07be5005fb35bd0fa82f81f982707e1c6ab425a8d59
SHA512bbe3c3c1748868f994c15d134a0560acb9d01146520af73163b5aba1dc8d19d3b41eb607d2910c2688b063aede2d6881a0fa38f758f8be0be185987634508689
-
Filesize
15KB
MD53385ca0687676268f3c2dd5f92a76b4b
SHA1ee31c43a1c97960cd0e2e834e28777c056a2f497
SHA256eba76823b12ed75205b638ef10c070345b9d74ebe9f46ae1ba8387a19dc440e1
SHA5122ecc8e6b5f6e466c5bbefbc04018299e6438038084e816cd8f6d4b26cf2569c2767f73158b7a6702a533ea108ad69155dd0c875602aa73400cd85d223ee1b2b1
-
Filesize
16KB
MD58b729a5346e9a031f9c42b12760174d3
SHA1b71fccbafb9f2558162c12ad770aecfb43cf37e8
SHA256042074b8232ade73e613189227935ddae275c4db1b438e651fc2eea07300121f
SHA5124dae313cb4f9262972767efec48e42c33bacbfc671426160d00b76a6043c01424984a9f92ae2542e953ec8a15fc86a3457d9cfbb8263daf888bc07e25a4b6dea
-
Filesize
22KB
MD55f51934067e9a45a9bca97fa9d104454
SHA1dc8235c6f840300e8ee43e8673b22518b7cc8936
SHA2561b7392ba8b182dfe8bf849673e9e523978dc4ec49d4aaf8ad502575b41d0caa6
SHA512a4a069a65e7abb76de86ba39c7b5ff0faafc9cee89afc20dd6e93d33520c20f5795d9f0e3659eae8ebdff73108de174f129abd269ddcdaf6d3b1df7a174d34b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c13ca08b-5d83-427d-a5b7-8af2afd536aa.tmp
Filesize36KB
MD561485c1f036ee6f8839878efb9a8bc65
SHA19c82a0522f0d09b1dd340327c37172c9ac011704
SHA2569038a089cd21ad7896a5be03fdeb824bdcb7a6f4eec2ae45d0e2393478f6665e
SHA512e09f8644b4f490229ed2f4dd7b135b9daf533936da7fe5fb3bb816df57fbc35a705449d0d7611490e4e2278975fce06a6f20412938e0c591bb756501ab4c8e0c
-
Filesize
900B
MD52a38d8e409815d1d6418f7aa895cc2c2
SHA19bba22ee3ba3383fa3b17f79f11a75fe7e12e8d7
SHA25630aad5b1b40a16ca61312f708ea90611fef973f1199ac6a6c3fdd7744983db1f
SHA51295471d1c51a70b62962032f6b4f6c145f0e62034efb925ef6c3acfdc1f5d1cdcc2b2bc5d7ecb0892739df7164c8ee6f708d92a8ce6e0c70578b40eabf7a4654c
-
Filesize
467B
MD57da0a030cd6f2ee9c1f158bc02804855
SHA127a29fce1eed727ec745d3db5e8c445fd40ca19e
SHA256bfc40752dd3c788b56737feec1c2bfa0705e2265f5fc6c8d32f772cb728d13dc
SHA51288eace52da2d6112b2a18f2fcec6c72db69bd684b2bfc2898404a589880e0e9a5f90569cb196994ae32d10b02569dd25e32754e2909603566faf5568da101b27
-
Filesize
23KB
MD5f13b97c31ffa53bfacd173a99bb987a9
SHA143f2fe85c42451baf4919ca65e2e6466dbb896df
SHA256ab920ad59fa4b5a2ea261cf87dd404b8ff7dbe68da51fbea40ce6c9e23013990
SHA5125f2dd78be5db1933fd131223b1720679fba78bb1300727f08ef4b2cd3ce29d7ee42af42a4cb435399fc4acc4a96954e92d00c80ca2e8d8a007d0ebd183821d83
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD5b4a9ca915fff247dc31e089b40bb4c4d
SHA1edb768b295d72ab50a4f21a04cf812d899ba8c21
SHA2562705b8915fcc668bf5bf2837ad07809508e2e7101a77a41136b203b7f3dbac5a
SHA512838f545d179bf21673738074b41c704e3e216f2b319935fa60b3829435a03bb782db64572e68ee83de071a925e5c02222faa8d49e0403800cdaa60066446fb48
-
Filesize
41KB
MD53310728c5122e4e6b727ac260e760d1b
SHA10a34604129f0c3ef689cce8271a8ea43dfdb7a85
SHA256cf99c6d89990ef9e8a904c7026eb5cfd051db4226495d978603dd04b664c905b
SHA512ea4b87fbed2cdfd5a1bc79e06bf0ba200be0492754e11fcf6f1772bb7bf39c393b6d4081753a420649010e458c76cf85e3edc5e20a2c124f24b56b5ef3e4022d
-
Filesize
40KB
MD5f3bb5fea295380c335caebf93ca5831b
SHA181d4ab7b1b782faeb236225ddd3fc66e4ee366db
SHA256f1e5f691cd5a0632fdfda62e47b19c217f7b6a6970a77047601c10fceda6024f
SHA51282414d6fb20b7f483224f61f62670b5f362f7e3bc3cb9ca5328594f31e846e5b0a2886948ba1c145f5cb67e401bc1d849d834fea1d362d89b99f53733f628305
-
Filesize
50KB
MD568b8cee88178add532c106b12f7471e3
SHA1fa04499c7cd8b608b50fa91909e0c6642e71c31a
SHA25655c697de4dd9b5cceef2f1dfdda7b0ef341f62bfe8093c428d664d1161a336eb
SHA51264b984501d31118844af57330d65e853fc108efb9358a7b0955b1765f7507022c299fcaf428c01e1938a2bab34b29be8036cfcbec523ca7ec94b247cdb8e2751
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5cbd9ea8ca1a320580b6d0ac9d5e1f7a7
SHA18ee49b148d635de7d41969edd6077571a1c6bec4
SHA25630bfcc0a104d3e2337b55fbff19dbab6f6f47b1eed2430f52c7370c9dc8a858c
SHA5129059ca3ef47d1f0acaf3e88f77e68349de29405ffd6c3f7bbe116120c3e6810e168112aa63eb8646d00938dab74fb404bd27392537c664d22284cb5efa00b3ae
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84