Analysis
-
max time kernel
85s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 03:09
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 74 1368 msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4044_1021758528\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4044_1021758528\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879505618587362" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{F2EA31A3-BD46-4E7F-8C7B-85593D3FABCB} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3968 4044 msedge.exe 87 PID 4044 wrote to memory of 3968 4044 msedge.exe 87 PID 4044 wrote to memory of 1368 4044 msedge.exe 88 PID 4044 wrote to memory of 1368 4044 msedge.exe 88 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 4500 4044 msedge.exe 89 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90 PID 4044 wrote to memory of 1720 4044 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://steamcard.cfd/85301946831⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ffd44fcf208,0x7ffd44fcf214,0x7ffd44fcf2202⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1776,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2240,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2592,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3500,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4200,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4300,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=4328 /prefetch:22⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3788,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5332,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5380,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5112,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5176,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5176,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3680,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6284,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6480,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6484,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6560,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=6564 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6556,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=6736 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6892,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=6900 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6720,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=7032 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3676,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3712,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=7000 /prefetch:82⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3572,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=7040 /prefetch:82⤵PID:5572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3448,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5792,i,5453022834814242333,2977909371832607694,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5affc8a302fcdff20c64cd097766a621a
SHA13542cce04bd90152df5fc6923c60eeb13770217a
SHA256a526bb332cef94bb46c56846c32e3ecc6b692c5f7c8dbb7dbe56d4028dd5ac8d
SHA51220fc9051104449b668129fb488e9ae42650e4cdbd685bcfda97f6754954ecaf608d86652895b43ae9655ad05d9e7b60be00908d60a50e8dac210410521de14e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD50dbaa42b77880cf052896c76670affc6
SHA19252c936eee9e2d819022ef1eea1c2b96963f0e4
SHA256d840c7c478e76dc487cb95b6ba921abaf35c0907935d7f017a495b3fa8533e4e
SHA512566a95ffc922d281a91854941834414e9dd0f4b7074c2c6e3f2cef99de66058e3dc18a9b92b365d16bfc4b63330e1ef7b5e57ca7b09ea3ccd2cbb1921a291341
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57e82d.TMP
Filesize3KB
MD50dd50d71c41fcbd9095af6e112905136
SHA1516d27ba3b0f1e02739a582bf7b90c46c5e87fb6
SHA256e97ab68bd8829a98fb1d966563f2fba73c6085525318b8ed1f7df2f1aa603b9e
SHA51205e0c91ef52c851aa7ad41c7674ddb2cac26da93ea048a1cdc6e19756ac07df02faa95144c8624e1a47703fdd12c0474dc473b44b5cdb2b1b29a245d221568f9
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
4KB
MD56f92f65fbb6d4cfb354d9d11b3dba75a
SHA1e00d0b5c0afbb9c9d9f8284a20701f606f61ef15
SHA2562b4af76a1ca3bf1480de7442a939a08444076d734e04f3ac76278fafad82e13a
SHA5122459441d9fb385a50e0c7b1fa7939c47531990e9d6046c64d635d5dc5189eb10ef59f9290820ec8b30a86e04073cba7eb427711d85715bbfaea7e51ac3478537
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
13KB
MD5d42c30bb770f8599dbb77c267bfec3b0
SHA12e9eed00af550921324abc501089f2ee605a8256
SHA2569547f8fabafc12de406e45c04014d95ccb58a22a2a5d7c3ed859cd71de466e1b
SHA5125a898c140030a7c0566ab988fd74cee0edd7a7b65c52a46b2cce729106ba397c134a75e99e445d62b2d6439bcb3d415c4b81ee0e01fe33c22f92fc9eb306118a
-
Filesize
14KB
MD55aeb72751a537510c4392bff2c561de3
SHA1e82b5a206acea47a77f7780bd181f110c34dce4b
SHA256678226c545b0fa7324c9a3188fb2c93a4ca3b5c927af48ce93238ea8bb21f267
SHA512434b61982ca50ab896dac57261ae26a2f7714dabef75be3fe5769996574d1f6e0c01243fa4557adffb44fc32eef72119e55186c16330c430be739e07e9834172
-
Filesize
36KB
MD59e1717a9ae0cdf0eab5ae1878ca7f5ac
SHA10e908c409ef4844ae4212629b5ccd3490458cc8e
SHA2568243b907e5ff24d4921d26508db2b496d11685e5d75f73fc57077d444b504db6
SHA51233d253f57c027568f73501835943fab10ddc8011126f46010e699a73a10afcbb96602f2670b56c18c6291f2979342b3c30e07025c2c38f83e9bfdcc20fdf4aad
-
Filesize
872B
MD5a8cb8678b5574a66653a6134c65ce51f
SHA1103133dfdfbf01a6628650594955d70abdafd7ed
SHA256c3877d25864c9c78f9e4456af6686f14cd00531bfe5fadbddf4aa2764a33db19
SHA512b32a3c0dbcaa5f2e6de0fc7d8a695adfcf9a92ccbfcdc13f1ff3711aaf8351556a7e4785f41419e6c6c2aa100f9950d3c965ed68b5d8c319f36831b97c33231a
-
Filesize
23KB
MD57c631b3350e96c45cd9c827ddc911136
SHA11552691d03dc668b175d0c5e23bee0ecce7ec89d
SHA2560decd255d626479b7693542fa2b6974a119275bb4db3baf809a73344d07c6ef7
SHA5127e1575a80dde9cbf6bf594881f9da10ec5a25c1125969fadc9695e28021e4b57d3a53abaaeb9e1eaee051ab4af9db4030790857c1a38a00fa0b3b1f9d39103bb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe587d59.TMP
Filesize465B
MD55ea00815473c41435fbe8c4bf85dbb05
SHA1a5cc55df65ad1cc6d31fe658d810bd303c21fce0
SHA256862cf579595f0d41dec1b759cac81f1dd8cef38c8ca6b18f140ec00363c2352c
SHA5121691c5eb351baa1809ef675255dfe9c1f06bb22e8a35ebacdccdce50ce8d70061135ebd7c39c1536740f28bd6d385f3f32d218d3c3055d121b29e84b2ef00a1b
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe587e43.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
Filesize
30KB
MD597b155a22b3bd46e9df823df578d3af1
SHA1ecf698826efbc2bec8fd67f94e10706d4564420e
SHA256c824894feac3ae6363f96cdc1c0a8ae03bdf0cd59a0440b6418db64fb3569e16
SHA5123b15b83790378100dae2a4ed523b8a021303dc4b009d316e8aad309ebef8711257603a7435fb75c93f0331b20028afecc4a362ac5f9f34311d1aef0b70a5eb52
-
Filesize
6KB
MD5d9a3f83f1f3182b1133886c7ac569932
SHA1d4d0c0f2a6ee5d689f28babaff3458215680dd11
SHA25676e021b7c72c254eff1b4d68a840099d7e760e87b5b30eaa8f21b3de58fdeecb
SHA512b9bd930576c954e57f54111d24b50358457a02f91a829ff408e83c0d20fbcfb04771e9eef6077a5a82e5212043eb8b2e49d2e7e9ddb23ac36fd2b9671e7434a9
-
Filesize
7KB
MD5c3a2be8d5edddeee5883d5ecedf50fde
SHA1eb3db8cd8d03d0e88e21d7534db7b390177ad33b
SHA25696c80180442630680017795529b815c1e7f5b9a9671b02908db8d805cb4754b9
SHA512f23dcb66851012895b6f17882a0a2c01fc585ca411d475931f5f3e30d2670aae76d9a35ef9c9e1e7565dfae7b5241c03955f65f4a2a2016ca5e81e46fd8f4d1a
-
Filesize
39KB
MD514b457f7d8ef33f2e50234ca43a4f6e4
SHA17637c19736d22ddba300d923b09778420fb75a8d
SHA2562c4c84e72658a02597cab62ad47e9b2398fdecad79583d48399da4c879aba6f7
SHA51200a19937110a5304cba43b67ccfc2ed7e20f6f1aa6f0a01452c820bb06991fc3338111fc3daf45724f6e2b56bc0a2cdbbbb956e5dff9b283ad800f88de5309ec
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD571e320bba0b7b2aae3594dcd91ca9824
SHA15a74fd82bba39cff4498aa1ace82a4e5784314cc
SHA256725bb18ae1a149d61b14713504c2f2452ccef5601991ae42aa04efb36e79a93b
SHA5128a603274fdef20b03fa33e3545697ee563b0067b1b52e2c0688427a2b95ed8396deb3d1d2bf2d9c86de46aaafe612c48aa0b93a5a19abefd13769edb3f0349a6
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de