Analysis
-
max time kernel
53s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 20:43
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 48 2364 msedge.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\hi\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_1652_527193103\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1652_1903783983\_locales\km\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879274081869632" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1062200478-553497403-3857448183-1000\{67C8717E-0FE1-4E6D-B6CE-2567285D6E79} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5484 1652 msedge.exe 89 PID 1652 wrote to memory of 5484 1652 msedge.exe 89 PID 1652 wrote to memory of 2364 1652 msedge.exe 90 PID 1652 wrote to memory of 2364 1652 msedge.exe 90 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 4004 1652 msedge.exe 91 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92 PID 1652 wrote to memory of 2480 1652 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://steamcard.cfd/85301946831⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2ac,0x7ff8e7faf208,0x7ff8e7faf214,0x7ff8e7faf2202⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1724,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2280,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3440,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5012,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3420,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:82⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5052,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5668,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5836,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5836,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6280,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=6288 /prefetch:82⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6424,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6044,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:82⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=6464 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,2149094434179987904,9380014864916390718,262144 --variations-seed-version --mojo-platform-channel-handle=6524 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5988483aae061a30a2c1a9f2ab6642aea
SHA11a739edf5fcb7371afa26c665484c73db306219b
SHA25678c6966d6936d23d3ec754ff916fbf9ae4abf0196b8bd96c8e3753406901cc38
SHA512093e0a92d7c3fdfd1425824ec7b47f96b3ad4497d8e52c1667015ccc31c427ec10fa97d0528eb08db340c952d103a6d0bd7116fd6ad78b0fbd81241166750936
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5818b3.TMP
Filesize3KB
MD5929db8e43a75b521b60237de23534ad9
SHA18dba324cccb619a9ff5e7651a4af2d8560062247
SHA2566c0c58f4d54ace0a7fc0c78e70ce45a87a0543054a4773dbce67aaa2bc2f9f07
SHA512953f24a1e395041e95f4f385de5f7a8f340d9bd1f8e34122eefb6034282ef8fc9ee2229be1c3cbc7be8f5d30dddf1bf41ff831618149135a747e8d3a41a45add
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD51b6b68c2a1cd13fa0e5bbf4fca2d2b20
SHA1f5c429d6b6f146bd7b93bb7df169a78e052a7572
SHA2566ba47210eba2288c61378e5140bc297028aba12cfa37749dd4c4618046c5c4b8
SHA51241505318be1d5d7ea93eaf5e179189383507c25614a4726b37d100cf5f196b0cd4cfadb5eb2d35bd27d2655a1ebc9ccd483d3b9c5c3369dd33fa4102e872bcf1
-
Filesize
16KB
MD575a4d20596ff8891270d80c0e63629ae
SHA145b32e89a1a457bce912e0c0dfb49bec3c774d07
SHA2568c03eddd80ee7ce374d4ed7898cf7773d3d0fa0715d4c08b70d54dfc728f90b3
SHA512c94d4cd13a84a2d8574470c52b819623b43c2ee33fd93070ebc51f0e750d501e82ca6b6b30650bebba53062ac8804eae4245e867632dab237fd5c7588bae6ffa
-
Filesize
36KB
MD5f37a2b2741eac00503dd915edcace421
SHA101157b19bce088d86744a9e5aedf84529796705c
SHA256c4e338a659e8ab372f34ff4c458b570e89916c534798416b9bbe90efb31ba35f
SHA512e9528ce4b1de37d83e38510bf045b88bdefd0bf94ad6e59beea5327d4a161679eb6828543a7f91c2edfc2b889ccba9bbe04464b8852084ba81e1b79ce873f66d
-
Filesize
22KB
MD58e69e7ad09d90aba64d8e1ccad4fba08
SHA1927c76c28af0ee9e4daeb54a12ab0e6765e93aae
SHA256773731bf03c4ea1f5f52f67c5f182d0ad16c6ef2d0787e05b8f9e1be117f5bb8
SHA5120d195c07b51244f9c299174db14a4883523f56758f1de133fa531544375b1cf2c10fde2923b71617fcd20f52c59486c280b40bb2342cc8d0c375ed48a67f01a8
-
Filesize
40KB
MD52a47ecee771beb2bd3b12d2001c87e1d
SHA10118464ac89e43d86c03dac4f56a3b0dba665655
SHA2562ef233f8a2279b75aa026954f36a816e13c844d8e019196fd003767aa1cf67a1
SHA5127334df118cf3ef5a534e737e6e98ae8e91747bd0483b6e0fcd1a57425a193a8ce8b2ff7e60f958ca09518c37424d7afddd3943c28ee092fcf549fba21bebada3
-
Filesize
40KB
MD5dfd905a81d846270f1641202498a8d21
SHA128967d201a3d0fd95a337b543be7fc31580373ee
SHA25674fe9a49dff512d43f0df682afe6ccd6c58736bb953867bc3b96bf9ad9f8d270
SHA512cbbb5e594e0de1a464be90b72fe05a9bcf0656cc5ce152945393fd93cb09fdeb7fde8fb9ea4aed9ffc5e8bf43cb17ac03ad6a47486c9d416619994838856b474
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD56decc9f16888a2e422d80f218d0ba462
SHA1961ec8d45dc97862b766cdb1f7eb0bba77f51be2
SHA256868f858de42952f25a353f9cef0c462df58fd050eef10ddd73c78d0d5cffe44c
SHA512fa8950dcd33a37c09d39c119bad9a6fb07d99f10a36709be1e9c099f1547cab2234cf675eddc87db0176ec8910b917be58bf9cc7616a8847e98ce07fe7e74ab2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84