Analysis
-
max time kernel
22s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 21:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/16xo3XHFpmHl5Qi9s_mPEhGQ6K0iImM-E/view?usp=sharing
Resource
win10v2004-20250314-en
General
-
Target
https://drive.google.com/file/d/16xo3XHFpmHl5Qi9s_mPEhGQ6K0iImM-E/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 8 drive.google.com 9 drive.google.com 17 drive.google.com 23 drive.google.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6140_1277020264\_locales\sw\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133881046391593648" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{9FA364FB-376A-4F1D-A7C5-8AD9AF5545E1} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe 6140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6140 wrote to memory of 6048 6140 msedge.exe 85 PID 6140 wrote to memory of 6048 6140 msedge.exe 85 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 5736 6140 msedge.exe 86 PID 6140 wrote to memory of 5736 6140 msedge.exe 86 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 2464 6140 msedge.exe 87 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88 PID 6140 wrote to memory of 5232 6140 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/16xo3XHFpmHl5Qi9s_mPEhGQ6K0iImM-E/view?usp=sharing1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x290,0x7ffcb0fef208,0x7ffcb0fef214,0x7ffcb0fef2202⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1768,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:32⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2452,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:82⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3572,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4820,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=4924 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5196,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4840,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6432,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=6444 /prefetch:82⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6608,i,7813312261245876114,13384794886204828262,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5c0209c0ee3c245b122e39b5ccc662ded
SHA14b97f689e2692833120c86c451aa3a9c4f0b0ace
SHA2561d7568b47c92945d8384bff84b3d2732b8bd8ab2646b67244f448596bf01da25
SHA5127af9a3b3ceb9100614304f1c0068b935f076a305818d1b6eceae59fc61990a0e97c46a33b55e7c50270839d736db57d90746a98b540953640e091e3b65b985c4
-
Filesize
39KB
MD5e53d0854b2e8f066bfda7f56db887c9d
SHA119e43696d4e134fd5d8db18ba641f04de047716f
SHA256610ab365843e6705d4f89d36fa2253119b41936351b7f7b48c6564a505903fed
SHA5129d59463237bf9b76b869fe8aaf05294e33fa2447ec2b2541d51db52a598bc9694bf6cc4650435ca2568852ef848fc66bbd728c839ced19ba3995c168b15fcb8f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD55af0dca35402affa3e2b875b5140e351
SHA1cb74aee878a93fadc2b8824c3e8d748efa042ef8
SHA256f18574c4356664dac8e11d33b220c0203bcceac298afa73e5cc94b0f551dd9a2
SHA512d80ac21587941e859283596b75db5c78f0a15abcc0bc84d6cde074ef1d33afefbd2c3761a5815ae1fa6c21f03ecf08e5d235db1422a312e7827ecf958347b044
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d4d4.TMP
Filesize72B
MD54704fb17dd3a5310603cc11db1ee0c78
SHA183598eed32380dacf39dd268f4280d935140702f
SHA2567c5729d1c248011d79603d4072e7c06f65956b0cefc44804a5727812d0a518f0
SHA51215d395a5a7d7a60555faf646cb297f3006b68d70b1641684d0aad0c66c2eb191783826b1d7c14d646d050b3b5258bae566320b42abbed4783b7a57b16bd062eb
-
Filesize
22KB
MD52f74b9b5718847c36b78ff709739818b
SHA1ae2da9d4cf65aabcb65d543b9e08bb93a3b6a935
SHA2560356931b9967f7e169e3bdbed02911413f2388c0d622acdb7edc6331bb1549a0
SHA5126cd65602b3f5bb9719873918fa8134e2a7809d617027a399b376091e20dd444c9a8c8a012cb5aee419246109418c96e2b5730d721f2dbdaf4221ce8ea6169680
-
Filesize
40KB
MD5a8337b4d9c9fd4f20c207c01fd6c94b3
SHA11151746d2176064b93885793298994979af9ac0f
SHA2569635caaf0550807d0c965477c1d6e4123af7ff1014f95eeeffa06844d2175e63
SHA512ed1e7c535890c364b62b23ad3a835a5faf82c34a33238ba58a2de733ea215f60b189602dd49747aed61c58110244e5f25358a46c001387ffad23f427f53909bf
-
Filesize
40KB
MD5bb754d501e3a7ee5cee78c1a2788834b
SHA1abda8c2908eb8d72de892a3c2f6431c7f1303bbe
SHA2566976a8983efe9671c3d8e0e175d85b163975963a03d68e91a5800021af44e810
SHA512b094292ea2f4e3fa6410c197a76d113aaf81a66a5617bc2d76d113c0e9fb3616ad1f8c81224a0a441aac9c1737c64fa21f833f32df7ee9c410df5d7d96c290b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD52cad023448218e601f8693b4d51cabb2
SHA187d4e3922abb07ba8d2f7e641ace608656ca03f3
SHA256e631ea8194c7b4e66dcaa392a8536e4bfe8e633480fe9784fbdcab72a842a8e5
SHA51255cfa760f253a372d3d5ba4035e98bff296a1823b54967b949ea418e430c2e8a6002ea5bf74633a13ed1bb242420e755fefc093b2fd760c8462e806d7b98e3eb