Analysis
-
max time kernel
11s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 19:52
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 41 3612 msedge.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\is\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_2916_1779620879\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2916_473323733\_locales\en\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879243747072259" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920955164-3782810283-1225622749-1000\{50942912-EBF3-4FDA-9544-0DC891013F45} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1352 2916 msedge.exe 86 PID 2916 wrote to memory of 1352 2916 msedge.exe 86 PID 2916 wrote to memory of 3612 2916 msedge.exe 87 PID 2916 wrote to memory of 3612 2916 msedge.exe 87 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 3160 2916 msedge.exe 88 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90 PID 2916 wrote to memory of 4720 2916 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://steamcard.cfd/85301946831⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffe8119f208,0x7ffe8119f214,0x7ffe8119f2202⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1848,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2108,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2636,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3460,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4900,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4768,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3600,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=3752 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5376,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5856,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5856,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6076,i,12366392162076993707,11075542247007263680,262144 --variations-seed-version --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5c37f9d2c357647fca20f2eaa89c18edd
SHA1cfd1035ed2d057c317b48546f467209cbbe15f2e
SHA2562ea3a0b7e6145fd110653b1a77cb827ad7e4a145c29378344bd3d28f595b2072
SHA5123563f4aca9e47f35de8cb38e42a3c0448bb3ec4c9183fa392abc28fee4ca08bf16da028ffbf31cf0c0f8301ed810238961e745590e5c71621bc5a2a889dd12f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD57cd1075623bd27a5ea283df6011b869d
SHA1abab065d468cb58bf0ee8b51a3384e497791bcea
SHA2561dc34b7537a5b5d59d6e40dccfa0511b1f2230eb4879479839e127fdd0a95610
SHA5122ea4476f6c8aad4e3dd665840e90fd6c4e936a450812cb7616d39a66491f3250e35a46ae97759fdf384e4e50e9bb0e85143eb78d8026eea292f2219a2661c44e
-
Filesize
36KB
MD53eb563b7e05ce215e5080db150edc0a2
SHA116271d2d984e5702c149c1f567f0454f61268a29
SHA2568f54183abe4394c0b9833f0055f0a3de26b454b4d523e4a6bfe1b4217857fbb4
SHA5129b9e2a7d5a289373cb3b720cb6764fe7c14c7e8d812aa2b7f887fcf03d0d0656fdd69941e6040e236ef9ee0570722b05d71675043f069fc828d986eb8bd2072a
-
Filesize
22KB
MD5ab8be11f138ec2cba5feb0937e21facb
SHA1339045e76833b8b26d68d283376cd3bf6f34c675
SHA2560a83a15670948c6d897fa73286d4aa028efc18d095ea0b5fcf48b9157c6011ca
SHA512bc80c68687a660fa3e76e040482ca38aeaa552aba542647c5b45d7ca29e0efe9ead53d2bc5db2de4a6cbe98e5513c95b1b2fdecb373a0dc4e4ebfde6e835f52d
-
Filesize
40KB
MD50c5847a463e69519c12f5581c532e40f
SHA12c364fb15d44517ebb2de84d8280c456316f7fa0
SHA256773497b387410934d266e28d23265c49e68e6a0b2216021ec369806b2e26ee66
SHA512e0bfdf4f0a26ed25d05de1d2a76cf1d166e590edb24fc166cd506d92c0de8c2b36ecf31788a3a693a4e29045044ee78cc08429ca8764104ef9fa38c00c80f1d0
-
Filesize
49KB
MD5ed6138763c20150f6c1e1df848b8ad60
SHA1f5a466404c188dd3bba82a02fa6b7ca87e75c75b
SHA256dbad5c28036691094f68a3c7f683bb56e141ba7aadd81763a2819c6a088ffc28
SHA512092f9e0187d60ff828d0e69c12d523f5dda4730ff6762883246accf92f82c817cf05f6f2ce115f6c3f266c0382d2a46a332981e19fadc8968f9d6ee5a7b50544
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD57147aad03862dfc2cfd42727bf4d31fb
SHA1ca5e34fbb300c25524e6993e3838bf5f1b7240bf
SHA2564e265a158deb51ed8bb54da717ec214a709f3738341b360fb99dc426f8d2a349
SHA512e8ce1c44eeea35a4f13278213cb21f96ec8ec9425537d7f4f939efd5a1ab1e588d2c03a85f4956bae4c675dc78faf017d326ff506f54219e57be85a0daff2983