Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 12:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/15HKBqHMzl4Jy2fyv32gSL1UGhLQvE59m/view?usp=drive_web
Resource
win10v2004-20250313-en
General
-
Target
https://drive.google.com/file/d/15HKBqHMzl4Jy2fyv32gSL1UGhLQvE59m/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 22 drive.google.com 24 drive.google.com 27 drive.google.com 8 drive.google.com 9 drive.google.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_614188825\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_839926300\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1668788261\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_2110782630\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_2110782630\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_2110782630\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1668788261\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1668788261\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_1905994454\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_614188825\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5800_839926300\keys.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879849657889270" msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{20E8EE24-7EFF-4D4F-A304-5B88C9E546BA} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{233CC5BA-6309-484F-B155-B9DD37DA5F17} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5696 msedge.exe 5696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5800 wrote to memory of 536 5800 msedge.exe 85 PID 5800 wrote to memory of 536 5800 msedge.exe 85 PID 5800 wrote to memory of 5656 5800 msedge.exe 86 PID 5800 wrote to memory of 5656 5800 msedge.exe 86 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 3164 5800 msedge.exe 87 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88 PID 5800 wrote to memory of 5244 5800 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/15HKBqHMzl4Jy2fyv32gSL1UGhLQvE59m/view?usp=drive_web1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ffe2adcf208,0x7ffe2adcf214,0x7ffe2adcf2202⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1820,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:32⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2268,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2576,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3488,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3504,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5032,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5180,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5232,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Modifies registry class
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4788,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5464,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5980,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6532,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6540 /prefetch:82⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6556 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5996,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2044,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6296,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5544,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5604,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5876,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6148,i,2977889538136299418,17133437023439456217,262144 --variations-seed-version --mojo-platform-channel-handle=3196 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4956
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5fdd07e89031109ec5fc0b8cdf4bc5d42
SHA1e3896592bd2dbf45a94b2c388016e0cc3f43e059
SHA2561214ce3a244bbe0d66112431c7290a71c571011ca909be05fef76508e6c69ff9
SHA5121b29198788f9eef709d5a43d4fa85f9dea27fc807b182b0fbec4f379751f9c11e2a40ff570a0b2b34074823117f4cc45021ac24c468033e492bd9c28b14bb3d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe581d95.TMP
Filesize3KB
MD59fefa90d3c183bc7aaf5b3cde82e4188
SHA12e0f1bab18077eb2c489d32852864e7698ae8d04
SHA25662a29b7b532304bb762932a5ff70aedccb7e4c54d085191d32f27900730a929e
SHA512978f4fa85b29e99a2b0813c5730f2ef39b3f8ecdf308d23b4876ddda3e13cb47cdc3a2e2d68c1ff5b7c45030f31cf01c58f48b7879a9bca86deaafc48dda461e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
4KB
MD591cd999a99922edd038bfe95b0181cb1
SHA1b7c863cf50618831cca5c2cec5ef1ef6a37a818e
SHA256eb1b1acf717a3dbe7f3947604a0061c4d8bf4334b4b0785720fdbfee8d04e90f
SHA512c0a9e12a38c79d2f206167d85a89d043f18dafedf95efc008996dface8cc41e63f69f1664030704d1b398f2368b9a8f9ce678aaaa60e02fa25c1facd4407b700
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\c82a7c19-0577-4e24-864e-702de8cb3156.tmp
Filesize4KB
MD54060519a958b4912fb917fe8168eaed3
SHA1d447bf1de61394928958dd94fee4fa382cbbf7d1
SHA256524c40205c132116c8132dc24d32f1e03ee8e0599acc6879327f8f16129c6e65
SHA5120e5b859e0a2c3267af26382c6ea5bba93917885bcad457b9d95aef8a8c90d779312f6c79a8c3e59af4d743e62767b8f33e52b344dd6a99074c41c6e8fa184883
-
Filesize
16KB
MD52464e173a2e8041c36d8b87b947bfce4
SHA18aecd9223202dc3e834b9ee7bd7baff8c9e0a330
SHA25686b2f3cdad93934e56bae30a88cf65f9513fb1d0d553b6f777259027e13762e0
SHA512c38a73cbafb6f60b96610b1a4b2173f60a2f34dda571d6dd5668db5c3cde30d9d15333e0375933a5e0ac8c773477908c711cb318142856b4fb4086705cb9e815
-
Filesize
16KB
MD5ae3c2bda694c26347ac9a6fe9b20f8d9
SHA1a759f1133775f9e43f7c0fc4f80a75bd29129c70
SHA256e6b849b1d6965a62d1f04b8d8de400238dba7973665d9db8152426ff5d2101ff
SHA5125fe2c2ca02dd2c2a0c917c04e8bd276a8d774b400f0e58676770307cfb492f67f14cb8cf02949fd3542e9836fe4175f4ea3e6ea801783066c5a62060c9b78944
-
Filesize
36KB
MD591b8722b98a3c39fdf59057eede008f6
SHA11f6b6f501ad24fc6f72057b2fb4f5ffb3fa2f10e
SHA256a1e6e4b9f3632e9d221fa4ac654ff21aefcb1a841e40affc0accb36fd228af0d
SHA5127aab8c70e1ff7ba7d6b191130fa2c7d4de63ba0af282a110f8f69ee76d3dbaaccd2b99ff50aa7d67d4d1bcd880df714055298480a29e49cf8ff19fc7a4ea0d59
-
Filesize
22KB
MD5fa42f0122c0fd13520a5172b73b2e9a1
SHA14c99e032f1ac9b6435c20f67caf472e6b58acf48
SHA25614677f314b5d72a49e06dee02db6e2d5c80f7e8494cabf878202a025fe0a5e15
SHA51286f43a72f116b347c5f38a04ff5dfa242458288e3c0308df7261827d14265181eb681d5197fdb580812bf8a7111e8b7d3138c077cd6ec5795375bc89a1463cb7
-
Filesize
23KB
MD54b37c69bbb9aeb8f50b46fce3df5cc3c
SHA15f06557f40780b64793641fba225ee155cbcc870
SHA2563afed3b1c65c472438db6007551a0197377bdba3f45b03678c9f5fa5f7c407d9
SHA51206fcc2a052cc2d0093a937c5c1a0a524c149c08df36f92d2f13695e2f8d5c166fdc7ce8a3ac022f2da4af9b39d20ac3e2a40806e3de81f21fc08359487c77ace
-
Filesize
900B
MD56988dea5d42090018a7f016214306c44
SHA13381d12f53881ccc88f9794d8a594cc526da0237
SHA25614970c09e35c61f48d85c49850745ae540977a6b33b72d0e32d33c3164068912
SHA512ab48c9f866d148d32bbf4d657fee06af34897d786476afc7e54f7cf58e3e0487e7e4fef0752c0f7e87ac5bcce4a895312125037368d7a73896da11740106b1d5
-
Filesize
467B
MD5539a11bafcdaaa5be410801e137b6bdc
SHA1a284ee1fc8a3e230eb55f67babe2fa300b5083fe
SHA25612e94e7c5280a512d17a5e843b17f7eec635a36f00e4d6b3571411cf11d357be
SHA5126ffa35ff0e4cca57cf844d99204b2c6ac367c917483ed8b833b83ee89125a52efae80618c09c892c0a63ca270ffa19f3e914abafd5aaa6d509d791d20a3a2e30
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD5aa8eb107da1f7d4e001a7b3dbc710cf7
SHA12bdd5c9a80469c0d7129a72099e120ca005d1261
SHA256ffb75fd6f980b9dd467c87fa078981b72146c7d55e2ce5f6f9c52ec361624fac
SHA51251b0a233b84c03467ce45b0d6efb6198522c9362bb7cfd20d391bebb15d20e49ba17b9e25efadf527bbca9f3e8bfc38fac98cb545f26b4861b4c28b813e74475
-
Filesize
40KB
MD5695c1c2202f9d89d87a9f63c01389490
SHA16d33cfebb0bea8b0c0f1ed86b2524ee9101ef9bd
SHA2569a4a561a630ddb9de380366147850d8712150dac28c5a489bd7e295880d61266
SHA512ffc1a6ffda2988434ccf00b5e42497360188fddf0f20a2302b415cf51f26204eab88b2add6ca36cdbb03ab862decaaab6cf498a70097c5db534d835b3ef0cd0c
-
Filesize
40KB
MD5b366ff7cb1d4fd40e8b91e0bbba3bf39
SHA1a38420bd15833a6cf5a1586cd28d75552e041b9b
SHA256e183e048079a6bd53561c4cc273a9ea77ba65053035be8d487cb133d10a4ed16
SHA512e1725c3ddb669454a7e6144ce29483921e41f397877a9d561e7324ff3481d6b11e3e3bc5eba8870c4dc4d473c5ae0f102af9b18093b01f4dd079308d66c706af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5405fc62cd216fd1a64a774d5adef14b3
SHA116abc02319f0d5aba3ed378f2994ed35bb5dad66
SHA25635ebe66612b8e0a4a289132874bd5f709af6fcd003e512df5f1e9a435a8b4d26
SHA51298d1d29bbf4a56af0cfdc9512b1f51c048e0d3cef1bcb5b49d9ca983dfd5e975bf08974a9e97fac849ce1219f5b6d97d2139bfb49fd1745d1dd6e24d1fd3860a