Analysis
-
max time kernel
44s -
max time network
40s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 19:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1i8mlJWU-UJ8oBJUCBnDy9V5xBz1VEoUc/view
Resource
win10ltsc2021-20250314-en
General
-
Target
https://drive.google.com/file/d/1i8mlJWU-UJ8oBJUCBnDy9V5xBz1VEoUc/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 5 drive.google.com 6 drive.google.com 14 drive.google.com 26 drive.google.com -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\hu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\uk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\be\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\en_GB\messages.json msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\et\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\offscreendocument_main.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\msedge_url_fetcher_388_338240457\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\am\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\en_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\kn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\bg\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ko\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\es\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\128.png msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\lv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\mn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\vi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping388_1447193215\_locales\zh_HK\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879235884626979" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2423602651-1712563293-711691555-1000\{E9D23B75-B979-48D1-83DF-E442275C02F6} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe 5076 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 4320 388 msedge.exe 82 PID 388 wrote to memory of 4320 388 msedge.exe 82 PID 388 wrote to memory of 3176 388 msedge.exe 83 PID 388 wrote to memory of 3176 388 msedge.exe 83 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 3496 388 msedge.exe 84 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 PID 388 wrote to memory of 4136 388 msedge.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1i8mlJWU-UJ8oBJUCBnDy9V5xBz1VEoUc/view1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x28c,0x7ffc76cff208,0x7ffc76cff214,0x7ffc76cff2202⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1872,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=2312 /prefetch:32⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2276,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2456,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3496,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3504,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5116,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:22⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5284,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5484,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5476,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6088,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6088,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6396,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6392 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6448,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6604 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6596,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6208 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6836,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6124,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6776,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=4052,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7264,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:82⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6352,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=7376 /prefetch:82⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=604,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6620,i,6532441530358979770,7944881172630717065,262144 --variations-seed-version --mojo-platform-channel-handle=7464 /prefetch:82⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5032
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD59a1d48286ce97f5ce9bb99ff9b214ed5
SHA1f185dae5f66c2d622bd1fefeaa30223f737a67e7
SHA2560cf61088061592d94572c01fc6e6009cca561f2c3fdaacf76b6895964ad6e7a9
SHA512d1125f928650766c4fa2f12e614cd2f6de47b650cd56e8770e91cedff4edd03bea4229c9962dfc4778c2e55a7e39a959fb61cc16f4689830c157c93dd6934e0a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5b3e168db5e39a3173fb26102bba9bd9b
SHA174bdab940c7a3b948b870acbaa9cbe004fb17e6c
SHA2562a449292b018ffdddba4f1faaed342b59f77930302141d90273cf506a9bda188
SHA5129c18454e7d8f87a57af8523708815eb6c37cdd65e684cfa1d961d31bdca1830fd853348da178ca3731d4a47b1d47ae9ae005a14e074cc2bcffdb34080e7557ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57b43c.TMP
Filesize3KB
MD58fc092da5562b41807b67bc64ee149ed
SHA113891fa4626c26a5ceaaf60a4abd8f8ef1ae7206
SHA256fa4d086ae5bf3f65b75bcb6e5f6d6926a0c8135d0dfa14b030d8e986eb2419ed
SHA512ffe58bb0c1e41b70119b421062c3dcaa016275db7dc51ae705a70ea4a4f38743e1378fe503e353c8c014bb3f76bb1dd93bfd3915ff700405a77f00ed680d91f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Platform Notifications\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
17KB
MD5172ceb747d9136bb34613d72925a83f2
SHA16898f6d74ea988c9bdc35facb6ac5e51a3092461
SHA2563592f8cceaab98d472e57cf073ddce551925a68a9112850c87424a363824d20f
SHA512f0294b23e3c0e2890850bbc3ad50eac91c38d8aec325b8ab661010f11da0a55354832bbddfd43c5417b286388015477ceccd750ac90f0b5d6dfd51605905f5b6
-
Filesize
39KB
MD555301ff8307250075e0e93b3fc52d8cd
SHA16d8bb88df3fb0242b050403038104739bbd88e63
SHA25611f02cb874315d7522f4a292b0296be8f1c0091167477f7ec64f34a9c913984f
SHA5121a244445036054a9a162afcea731fd25750095f00563b6e162ab4c225768a92e9bd02490cc81d43a55aba085b65a9b4b3972213b150706368f14a7dd0f76df94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57566e25506513ebd41b99a0dce297f75
SHA1f1508d556b15abc6105afc2b0c6d4fef662c64d8
SHA256e8ac2f948e57eab2b0e4768123d356430d0a2828b91cb6fb3b6c5306ab252f61
SHA512ec28382274c4e85c6b393ef2a8568ffb1da343399e916c430add106668ce6a290f7b1dfee047cd8ad04e6ebbfcb8e959970158fd53b9018189adfff704274260
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579710.TMP
Filesize48B
MD5209dd69842f81f0059da1b01efc9ca08
SHA1c7ded14e16d352094049094f3f145cb26cb4f147
SHA25642d972ae14cf87a93ebe5a896fe3d817c172f899e82fee017a81307ab08aa12b
SHA5122ab209c1e487aa686f83b14e719ff68fd34e9a0ae7190c0e09d8fde09bb7f2b139dc22236d02f2bf0d9aee75883acb53508ced00214393c48dbffa453250bc46
-
Filesize
22KB
MD508e5177bd13ec19d9ab4845611a38618
SHA108b30b3753b28c278a826e765719a6faa5907e82
SHA256ed25ba21c5b92d1be1eeda2339c1cb0c78b47509861188e8cf3f8732b841cb81
SHA5121742f235d9a1c73e85dff30143cc1eaf7988888de20213c62f58d034c16bf33b1c1ca0496470a1bf1929fb30a133cdd2c9d83312afe5ef70318077203cad7d13
-
Filesize
40KB
MD53a93a9219ed634d100cb605ce814b6ed
SHA10c6a7514946f91a48b642843d3db31aa0ee6c3fb
SHA2564528db13b3e6f2d4cb0051672b319a1e229ac5ae86b688db0c9b502d1f1e438f
SHA5121757ad5c1f0b1e81721ba372235f8edcffc25152eab9f81148e8831f0e0247c90d33ba2977d1c7996514ad058dddb6c5924060f68eb44720d866df9e483fe650
-
Filesize
49KB
MD5e0b97342c3bda8be09143fdda3b48461
SHA1789a11d4bc5ebba016575639fe0a23311373cadc
SHA256254a43be02bfa29908b0b262c8771fd046c83f45d24ec3f9945c2a3c8b68604a
SHA512d659b8457237ebdf425acbb7d364027cf1b8aa5a86168e5394a981c0cad68585592ed8e1f33ae7273902446a3d7e2c8accf579f38bbd7680c9a5e4dc44e0f952
-
Filesize
40KB
MD5704396bc80b39b7cbad8ce1dabb5c195
SHA195cfbffa4da4fea60f7c9478509bafa9a49aeab4
SHA256be87ba8cc39d7283ffa34f0c331005c7e14fa27f801ca6939b5cff852e4487b3
SHA5128d272d41818fc9ae7dd1457fafc348700bde28be0c5f3e9341c4d94f9461a5021524345bfb388421ad62de5333062a073baf1c2adc207a64d914765597037171
-
Filesize
392B
MD5559344359680e75e3f40e8ef98f3afba
SHA1270f7a5d58a35389387584fc26ac7c832776e8bd
SHA2563b72b4efbbaeb59bba43f677dcc50afe0d00299fa2e2afee736f3014cc6cf3c3
SHA5128cf15fbb0157bf20cbf52effbba4bd992b9e35b59f3ab01bc08d1679c379b0ebf118d9b41434064b8e2c24858a6c0de668332d0b9ca7ae491eb728de45b5d724
-
Filesize
392B
MD5845d976291f50c8133ae036e83e39a90
SHA16f7493dec8864b92819af58094e8973b7116f5fa
SHA256069922436630c70adfa8796f4b8df7350c820d789f868eaa933b2dcc48d3729f
SHA512ea2fb1de969f4a889103a3293ce37ef853cb5e88ec797d867a5139fa4bf8ab8a17ed08df353a06213d7d6e84a3c9bb1398e61f289053431d3ae9ca68173074ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5a78dfec8f7b6368705e6304c1b77a59e
SHA149ba40bbe0cd5cdf4ea04f0a0e858cc476480cbb
SHA256e7e17018dc4ba0abb05111ff08f628f501ebe5c911267fea8195b6973c23c03c
SHA5128a5656a7e2644741ba534cf2906e0b7b604ec4e1a4de806971ded55a96ed38a16278da325af51ac275da4ecc80e491a96236de8b8356eef034ef3875f5518dac
-
Filesize
2.4MB
MD59fa2014b0fa5372c60aa343cb50c310e
SHA1483fd06185a24043c73ba7e7823ab4f1285f040e
SHA2565a301e2e8bebc46f9a890a7ba0b09b786720cd91e64f3c8f37879a76dfa95525
SHA51226d23420a0e6a6bc6e4cb61c7f616579e84167d82775c570494784f3ce1cf30baa8e81ddf3517cb738dd37967448f463b8f18e9d6962861b968895f1f1b37ac0