Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/04/2025, 04:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/mRVoKM
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/mRVoKM
Resource
win11-20250313-en
General
-
Target
https://gofile.io/d/mRVoKM
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 31 api.gofile.io 28 api.gofile.io 29 api.gofile.io -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\es\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\et\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1504754941\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_512384752\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\fr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_512384752\keys.json msedge.exe File created C:\Windows\SystemTemp\msedge_url_fetcher_4988_516863939\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\hr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\vi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1584669013\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\no\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\ka\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\hu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1584669013\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\128.png msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1504754941\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1844538871\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1844538871\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\kk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\ar\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1584669013\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\bg\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\az\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1844538871\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1844538871\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_512384752\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1584669013\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4988_1182429318\_locales\mn\messages.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133881297453367054" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1216697136-3907990103-1733992739-1000\{5963A9FB-C8B8-42A4-906F-39A8858A23BA} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 5372 4988 msedge.exe 78 PID 4988 wrote to memory of 5372 4988 msedge.exe 78 PID 4988 wrote to memory of 3448 4988 msedge.exe 79 PID 4988 wrote to memory of 3448 4988 msedge.exe 79 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 904 4988 msedge.exe 80 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81 PID 4988 wrote to memory of 5880 4988 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/mRVoKM1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x2b8,0x7ffd5944f208,0x7ffd5944f214,0x7ffd5944f2202⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1708,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:112⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2180,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2248,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:132⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3400,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3408,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4816,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3668,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=1564 /prefetch:142⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4820,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=3676 /prefetch:142⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5644,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:142⤵PID:3048
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11283⤵PID:6136
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5668,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:142⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5764,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:142⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5668,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:142⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6120,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5852 /prefetch:142⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5892,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:142⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5732,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:142⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5796,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:142⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5844 /prefetch:142⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6220,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:142⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5576,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=4136 /prefetch:142⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=4136 /prefetch:142⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6384,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=760 /prefetch:142⤵PID:6124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5520,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=5700 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6216,i,2659713384809287371,2727413571118360027,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:142⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4184
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5ae987eb15fd5136f2fa707a7b1f18abb
SHA1bc4aa67ba8692031bfead4b653fc6fefaee3dbbb
SHA256f5e0e4ee660e95e1c4f64d5aa134aacf9f7fa1a9b9cfaad10f5b57b24d331d1e
SHA512fb98d55c498ab80b1f7886b56d0e652e648666bfb13c61c20d495dfb9f2e473e24821efc48f103fb0705e199e56b3e23a0bca82c0296d690104eb0d79032c0f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD526df20b33b579cff6a53b37c6fb958d4
SHA15d480e6f78deae1cf49836e2e9d9ae4bde4355c3
SHA256800c3cf81271a403b64ecf2087272a8b4868a2ec259a8726e68b827f78608903
SHA512b7a06e31244763dbc0ac476f4b7cf33fd186efd5e19108f261f02d217467fb8796482a06b07e522c0ab53e6aea93e52cb0d823c7c614a69c66a164f5ddc967b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57bc99.TMP
Filesize2KB
MD5cc2b91df4ac00e9081a2b9ddb65d5734
SHA1a7cdfdf5440224dbc0d10f598b4f2232009e5de1
SHA25624756cbb66d75ea6fdbdd721b44ece5f6d321321d0c6dfe087f2e9ea6fbd0c45
SHA512b9954d6d562208f1033813e93f72205ae217486836f2f8a33315fa9b11a841881ca1d389d78d2fbeaffec1abedd4bf5a53c2d668e3c75070085773adc7b2d107
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD5fe78a762bcd07f510aeb6216f0fc69e0
SHA191e1aff1bff61db7230c3850ca9e34c404927fb7
SHA2563dcca91ec4d9323cbe6bc466a085a2a3b94e8a4958b765d095c410a206e97024
SHA512ff9927d76b8956aab79659de3d5683cb77c27fc33905609fb6cab64c99fff4cec5fc342c0e9f99586e5868fe2cd8094e9110f1e752a19e63ef42a6376278d57c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5a859a856e19315e56e02339dca1fecae
SHA164c8a10c862ecbc9a1155a49e1d48c5f40a88543
SHA2560691ab1ce3b3593cc7bd1763438f3f6b69a2bf3dbe412da531889dbf99fafeae
SHA512da6f1bcf9eb0c2231ab8831a672f2954fcf288bb66743a726eda3af0ff3d256108ccdc8141c601fc15fc6dd6c296babdf742720f4ff0d80d6a00e1c9b314bb18
-
Filesize
37KB
MD5b01521115f1403ac8d23a09f41a82108
SHA1f3d54874e6967ba102eae4eae69693eadc861490
SHA25643798ce600c857584c2298dd856b8546c3f8efae82e95b3fdc4eefe3dbd74052
SHA512f99eb0928c491ff46ee38862c66b08b7fbb5df2d574d2e7fc0eb5b6953fc4e0e7063b37535370f7c840215c7950c70846b0d54db748cbfc247be1efdc5e7ecae
-
Filesize
22KB
MD526a72833103995c4d9aeca11d96ca8a9
SHA1fcd54a93ea450eaeb1766fc01e5097e649020e18
SHA2564c904c2302a41255da372ee5912a23b52c6e4372ebbc76201fe606ab2188935d
SHA51278066b96295a55acc573526ba8d0866087554aaaaf79c60dd190e6496c908397ce424fa9174c5d1b195af969036e879f757c3b5a73933cf624fbec82dd065d6f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b4c929ea-c983-4254-9989-7b77385f54b7.tmp
Filesize16KB
MD5d70e6b356f3528df1c8fac6e24cfd3bd
SHA1f2bce2b96e5f2de177fcbee3917c16f04115b745
SHA256a586ef0994853a1f02d51c3350f0bbf6fb9c18764cd77440db1e2ba32e6f5049
SHA512965f05420a8ea0de7282abab2f7bb9d920eb112be991f4c6d0ef120eb4d95991d47757248da2aa330293a00a404cd0d606905d3fc3f45af4fb521e8386de2ca0
-
Filesize
896B
MD5524bd8b54c95e30eea423d21b964f5e0
SHA173448817ad83a8f02300612a5a0428122508154e
SHA2563ca52bb33183f7b2a52bdb6bbf6424f4cc36292c83d8dbc9814558704555d957
SHA51281407647cc4950c881a588f18aa02998958b7784fc04211e94f4bc97a873c09c64ebb8311cccf843519b214c111662dee901587848a73c2e11a211f17bc1f0ba
-
Filesize
23KB
MD5b3fb4d76efbc70fe2e8548eff70dac82
SHA1adaced5778f9c8ef8139c3e7359b2b2df73ad8c3
SHA256d9c6798662a17051ce30c12141a69c3c4d76b097e6367c19fed5279e081b7a68
SHA512dd5b9d261c1ce0b73e45dad9c000689f78d237b8cba3d4d1cb5680aab0ff3305c834c8b7f57c55168c5bc91b1ebbd43075ba5a1dbd4ecb2b322d0c79ce1f0108
-
Filesize
465B
MD57f0e7db60edf688eb51423109bf34d88
SHA10ad7ef573e42323417c3f23a8de1a313fdcb406c
SHA25654fc39347de0c184ce813f1118be26e32c6ee08c93fd31028e234f623b7cdc6c
SHA512a20f273eae16ef21f76618337a5b2af2964cf645fb51f1005975250013643935c9e28a85a04c1075a868637f51c199c5fcdc4021d221178526a1329058a0123b
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD593a487e48244cf8073eb75059be48985
SHA1ad6a5f17d70e90bfe6ef516d969c85ba5828ec59
SHA256bdbbf086b264b4302ea8174ac9cabd8d0d6b6d1c9aec863998498cde9f916b47
SHA5126d12094a3d0b81a0591fcc0bc261b2a9463cef0e887ff81910c91d644841d1256145c42012310a27be86cfb0fe98464acf0198ef5b1f766cc1b3a7b3cdd3ed7e
-
Filesize
40KB
MD5a32433d99cf85fab5d648c2b1f900d04
SHA1cc61ed5af72474d21c965f619fa1fa5b128a18d4
SHA25694863f1dac2f7a8097909607ad69a24561227b7448e7d1128b6594431e5f079d
SHA5124a76236f23b5c5bf49c7b8c7ad7423dca40ce06bd7bacd6bc6056071f08072c1e0f82914b75281078b3ffb72f071d6e47717feac792778f7098981b558c2a35a
-
Filesize
49KB
MD54f3d16ca63c3daef13614fff6b9980fd
SHA111f7b551392f3709aa8324998394341d1c1e23e7
SHA256b500ca135ed1b5b4850d738a9168aaf8a9a0b8be8b64c3391fc02e3d26e4bde6
SHA512abed79d11183739acbfa67c269f7de8d5866906e4992084e5920db7c68a9e25f0cdee98c4bf8f8cf15e70a36df9545853705b076b9a70c4d361db4850cf766e2
-
Filesize
40KB
MD5f665ac6bc71658246b2a750721ae1ceb
SHA11fe41b7c320730ad2d30f1a3426cafb9623a6976
SHA256f818bdd979442c1ddf17494414a5f729bcf856230b1251343c4f12b30158fa40
SHA512c00cb11f53555a2562176a9220053f7ea638d8f09787130079fa940cf4622bf9967eb7042da79122d949790d9b3d3b2445779da28578b1a54ba34ac626eee35b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360