Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 20:25
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 73 1640 msedge.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_1954483776\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_1954483776\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_983400801\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_983400801\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_911662146\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_911662146\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_911662146\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_762421643\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_762421643\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_762421643\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_983400801\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3496_911662146\smart_switch_list.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879263360947456" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{163FA2E4-DD54-479B-B1AB-77C99D29F5BB} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 4892 3496 msedge.exe 85 PID 3496 wrote to memory of 4892 3496 msedge.exe 85 PID 3496 wrote to memory of 1640 3496 msedge.exe 86 PID 3496 wrote to memory of 1640 3496 msedge.exe 86 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4792 3496 msedge.exe 87 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88 PID 3496 wrote to memory of 4768 3496 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u.to/LNE2Ig1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7fff8ce3f208,0x7fff8ce3f214,0x7fff8ce3f2202⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1876,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=2620 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2580,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=2584 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2216,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3476,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4208,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4276,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:22⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3628,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5112,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5668,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5284,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5284,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6196,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6248,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3460,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=3748 /prefetch:82⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6412,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6700,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6708 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6880,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6860 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6852,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6892 /prefetch:82⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6716,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6804 /prefetch:82⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5320,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6776 /prefetch:82⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5936,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5340,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:82⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5948,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4376,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2480,i,2572172200904727632,615717501235328903,262144 --variations-seed-version --mojo-platform-channel-handle=6816 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD507262b58f6dbc829052bdbe7ba9d964c
SHA19d4ebd4a17640858150f05df2ac1f7856241eb42
SHA256f60ae8c905bc03193519463b7aa8f8e6709f2023f8a566174d8c8f2e7adcb3e5
SHA512e279ab7b654da854a532e3f499f5738edeaebe424b42384fb197bb53f39f9d86d8cd9ec49257e01ba95294112161d5ee786cdb4a6a64b5de119c42206c3ab0e0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe586c51.TMP
Filesize3KB
MD56b1de5c1dcbe034a001f17f4611adf27
SHA1caada821df862a998aa3ab577a7c9061859b64a1
SHA2564450ffacd999aad81267c3f188e4054da15dcf78aa39658cacf05e71fc0e367e
SHA5126fe4b9877f375ecabda10ab8a82ea24cc8266d786c87f1512d02d9b813f4d51456d60de55f5055c55a40f7d57f3ca18854a073ca5267fdbaf41da2740f3b1129
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD5c28c90f6c347fb59b18e8d8151f0cbab
SHA1565d4420a238f050c8d3d7c1b5abf0effe952e53
SHA256feaa2d96adbb3358adff6f85e062743fa83e7d0a2733ebf68a1a458702479555
SHA51292c30f0be8a71632dc97b41e248ea964151b441f649e8ec0853bfef4a460d941b7ba9f6ad137f2598572ea8c506fc89eaa3b0d654ce0caf4cc2b8041e07b0d0a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD5984c6344df3e675126fd2864076a59fa
SHA158c03c8a07ef581ef5f7ea677958d11f12bc4877
SHA25645699b26da203c2be36bdab4e91b79b67417c4675f150713a8fa3d12872ca44e
SHA512f09bdea3714af2487080407eaab573e7938d6f6e8ae8ad266b2af0dcaee68c8fa6afef835a9f888dbe3db5d9be0570168828e63cca0da386c464b691e43b8dcf
-
Filesize
13KB
MD53518b9d184267fd7537ea53132efa865
SHA1f662825b26d8ebf7b10e4790a99513b9ef9404a9
SHA256f0b03ad95bde7dfb2787c9ec6f282ef025ba2232b473a26ba5f81b1fcc5fadb5
SHA512c4f4806c6ee34d5408da2f496194a00564ff230be90adb9832ab302187522ae46159cf80e807083081e6f4f32cd55eada83b159b6102bd69531c5ec5d3620fd0
-
Filesize
36KB
MD540816e4bd04a4a480489cd2670804983
SHA1bfe399fe4a28d56d5f749817a3a9d81b98e8c6e4
SHA25661757e16d09b6b91636047d7537c64bf8375c1f96c8756c7e106c4ba0128cb3a
SHA512b2fe3e2c949a2fc52c0623e169c46c89f14ba44d8c82f2a28615cc22399e6a6623a8e5a5febc81f44964d0a235141493c677d231e9f95badb31aedadd099880e
-
Filesize
4KB
MD56d54970eb77a8c446208ec19632a782f
SHA15ae0e3f692429872472690558598e96bd3aab131
SHA256a99664269332514679778244fccf376527be1f96f77d19346205cbb539fe8148
SHA512243488e5b2237a1d4e4faee00dde0c359069a452befb5e47175da7c44368550034f8d8279acf59c562c70fffd950511e12b488ab1a819d31172b42af41bfcafc
-
Filesize
880B
MD57f55b952cd7addbf98d7225d0326a9d6
SHA15d93aa9837bf5845aa2334ef7d645e1505166476
SHA256a6bd9b412ad71ab9f219af50a6923ffa5dcbe1217bb6d39ae932edf61b1ed6cc
SHA512f83fcb84b238d1c4debe95ed3c4b9d67fb72868ae8f6fa1e51db4d8b4018bd2973a6a270fcc401bbeddf21b8f3ade9c526a35b7b6b58bf37ac489433b3f8ba93
-
Filesize
23KB
MD5f074de0595218e72890b497126885aae
SHA18f975d6964adc10f6108611bf70669fa30aa0e32
SHA256224096f65c8319fb65588449ae3f7785aa2a819060dc0b0242ebb9e9f95fbaa7
SHA51265370e12b7e192b8c54600285cab541fc5a7dc656f105e625d8d12dca176dbb5dac42a7ec7c85369253439994d344730d5c37ea9d27b0135e482fce0c7c0f95a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58ce28.TMP
Filesize469B
MD522b2bc69438e256198f7e64430592310
SHA175e735b2d9a56fea0316dfbc133d0c5b260d506d
SHA2569fd886265fa0ad3141bef3b6c10d24670897cc297d35d99cc3248bdab79513d3
SHA512d9ffd50db21ee47d065d67829c060eb88e9cf922fc2403e30ae920b5aeb2aa84f3a9577ec0231cfab8212ff69d7ae8284e08a6f7ec11824a39d179b7f9d78d13
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe58cf32.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
39KB
MD5c718e5602aa341512f63df78b5722cac
SHA1040fa0b254bd1355b3dc9d7ea9b86265f53f1eab
SHA2562a151c53e3dd1238aed175917163a43623cab26629ca4ddb2313d2600f8f48e1
SHA512872d8b2b96522307c5ea1c62b6690677964785eba78df4e3b99e848f8beb56e19ad35f945c5ef560cafbfb67e9674789e9a7ed6e039816b68840a5b92f17e544
-
Filesize
6KB
MD5fc8ad2859a1965b377a76a792ce73c20
SHA187a79aa44042aab8a557842234b9036ca284bf9f
SHA2565048bde4fe6978fccaa963e6180a6d8f72033a5c3eebe8d50a5de3c739ac56e6
SHA5125517122f420d6b1654beb6c8ba8e1a35cab71299b19a8059a9db38c814221a1ea4a66eddcbb52f94b7ba05998c8f46f5d6492bb65bc7605e5c22630a866d13e2
-
Filesize
7KB
MD52ade9be79d82b342e11be1dd4284587f
SHA1c15f0e17c63cc3bf46dd9e1e448203d7c1dda3e8
SHA2568c68c57b13774ffd81f489a175b81845ead481a884b52d183325bf47c21eadd7
SHA5121d4a2c98a52a36dcf4126c4f56ce337a3e8f93e85709c7e60698ebd96fd6a326ed9908f19fbb8f21df19476a94bac692e73a3c07f34cd205f2c6adb7c44e5f85
-
Filesize
30KB
MD5d29e6d387ef63ab388ab884e8cd193ee
SHA1389b926cfe0d6ab3f8973f03430194856c47b243
SHA256f4d81f89e4d8d4038b8a7281c348cda22afd58557151548177289196cc549b71
SHA512bd6a20580cdcc64e6c34f65469613a9eb49be341471d15abeddd1a6b4f4cc566575458f5bc5d62a5ac1065a296e185dd9cc378f4063b048fedf56033889f8ccf
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD550bee267da455dd026e84538aa48a0e0
SHA1fdae14574c8032b219e14ffdf94899f7765ab0cf
SHA256e801a6572fc80ad9250b8558b6cdff60508fc56135f0a221aaaddb99c595a5e3
SHA5121af20c61a85ac983325d9907f9f0cbe798ab3ad5ca30c3df8c1566deca8244cbab8121234ad9695b14040f956fb5e812d4dda3e54790ec419d5e191f82caab74
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5