Analysis
-
max time kernel
20s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 21:11
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 39 5220 msedge.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2340_1072589320\_locales\nl\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880154843033231" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{DFE89C4F-3C9B-46F4-9CF8-D9C7E56669EB} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 5112 2340 msedge.exe 86 PID 2340 wrote to memory of 5112 2340 msedge.exe 86 PID 2340 wrote to memory of 5220 2340 msedge.exe 87 PID 2340 wrote to memory of 5220 2340 msedge.exe 87 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 1452 2340 msedge.exe 88 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89 PID 2340 wrote to memory of 5776 2340 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://steamgiftcard.cfd/10539109531⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x250,0x7ff80598f208,0x7ff80598f214,0x7ff80598f2202⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2240,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2472,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=2980 /prefetch:82⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5000,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4800,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4984,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5376,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5796,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5796,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6048,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6320,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6408,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6324,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=5092,i,8260320970468647471,4803133807910527878,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5df2d1721cd4e4eff7049314710dc7c11
SHA1f5aed0158b2c0a00302f743841188881d811637a
SHA256ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93
SHA51211fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5dc063079f229f7c091787934b98a52a7
SHA1922b8854d035d1e47476f76a84ad6be1aef9490d
SHA256fb6555f2832d15c0164c1c773912f4bbec83b054a3338d32ccebca577e6bc5ed
SHA512b6fc1ad4bb7196fb68ad7bfb43bb87cc576ad9cad182d4b93b1428f9ea3a602c1114b5a85962a8267e4c8111d344889b86a0f3db5ab66f3d93523c6d3ba1a0ab
-
Filesize
36KB
MD52d043e4903c7409c8a554751f9001bca
SHA1d4bedb6aa347cbfcbe85b8b50e3ef04abb4c732b
SHA256af2c3088c4efbbff2eee1981cb53c7b9e7b8c0eb37179ea75c87bbc4287c204c
SHA51243fcceb0f3a3023dcd0467c8773fac0838c91d393f43dbf0dc416c065163159e58a6c295acdf7232b295c266b8d2eb7c672441872b51d5b5b0384af73c564fed
-
Filesize
22KB
MD58303889cba85b72446161bb75a3640f8
SHA177e04d47b2d3b7870921d40ffd61f335c577a10e
SHA256d5169d246fcee5cd0b54da99cad4808ecd53073095320ed7c9d8f482c6ed2275
SHA512d80a21501adcf8e875e76f683e01d62bc7b522384be1978255059f5673a5c834740b974007cc366e650346a74d39fef99b5ace4089ce094e8eb8b04527c10f25
-
Filesize
40KB
MD50d8d6121203af65fc5ce8ea403bd1bd4
SHA1e508638f60dfb1ee80c608db2c21159eee035c42
SHA2564e1a453cc9cf8863c14b669d17a19efbb988fd17f985bce3c25351813967e04e
SHA5122da6f31d74c0b720a205e3632fdad8ac559afddc0aac4ef71fb6fbaa898aa2843c39640508d55f48aef0320cb6c4048360305eec27996f93f5b8858db60eaa55
-
Filesize
40KB
MD511ade7013a236846827a332937e509a5
SHA1b503791bc652469391975c33122e5e054fd4ba62
SHA256d7a07a9a03944e599a21cd8c298b6ddea392704b6573646c5c7f2da3363c04a1
SHA51246aeff2932b7c28cfe271e5624445a06f87d4d19ebecad84373023ed04f99b9b866f80fa390b3571181dbb404239bffc8db80b4813c13d56be7a00e0358361eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5f468c1fed2bdf2ff33e373e8240c023f
SHA199eaa8f033409593cc3e98a5a396b4e418f5580c
SHA256c1b7e7ca9c698567324ad47b5cc88d6e602d3e3186f962ddb31ea7306b63d277
SHA512116022ba161411c56155915e6c9af13a5abce02c7a662274b95da89e77187dc658345539484789752b2cc00d386b6172dd0aca3e855282534a3b2fb820a8a852
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize8KB
MD5152380269ff3ba2f661d78ac1bed5455
SHA131807021dfd47c93361238aa93d081f90c83d5a9
SHA2566eb87fd2f8c57b97f237f48f3b75977a99120618f1e9bd718c3f5b7d6021ac8a
SHA512ffe4e0e6499dd4c8784a2fbd77b4783162a9ae7c70b6707c3a2258730cd6fa1ae6237043965184bdb2b539b66a9f56bbcee762b732ee2969564539e3cfb49b09