Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
07/04/2025, 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bing.com/ck/a?!&&p=960b7120f16ad795d8d9800e7568ed9c4f5aff49deb29080fd13537169253734JmltdHM9MTc0MzU1MjAwMA&ptn=3&ver=2&hsh=4&fclid=398003b5-09ee-6098-03ce-174908b861c8&u=a1aHR0cHM6Ly9zdWVzdHVya2lzaGFkdmVudHVyZXMuY29tL215LW1vc3QtdW51c3VhbC1iaXJ0aGRheS8&#POP=ZWVyb0B5b2xvLmNvbQ
Resource
win10ltsc2021-20250314-en
General
-
Target
https://www.bing.com/ck/a?!&&p=960b7120f16ad795d8d9800e7568ed9c4f5aff49deb29080fd13537169253734JmltdHM9MTc0MzU1MjAwMA&ptn=3&ver=2&hsh=4&fclid=398003b5-09ee-6098-03ce-174908b861c8&u=a1aHR0cHM6Ly9zdWVzdHVya2lzaGFkdmVudHVyZXMuY29tL215LW1vc3QtdW51c3VhbC1iaXJ0aGRheS8&#POP=ZWVyb0B5b2xvLmNvbQ
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\en_GB\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ne\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\az\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\de\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_976834135\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_400957599\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1707467093\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\kk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_976834135\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1707467093\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\hr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\bg\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\128.png msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1707467093\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\uk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\en_US\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\be\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1402863410\protocols.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_976834135\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\pt_PT\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1402863410\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_400957599\keys.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1707467093\deny_etld1_domains.list msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_976834135\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_400957599\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\hu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1402863410\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping784_1080439349\page_embed_script.js msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133885108060615105" msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-809364120-1453366396-340093129-1000\{475133B4-6029-409C-8524-DADC42C57BA8} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe 784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 784 wrote to memory of 5644 784 msedge.exe 82 PID 784 wrote to memory of 5644 784 msedge.exe 82 PID 784 wrote to memory of 1692 784 msedge.exe 83 PID 784 wrote to memory of 1692 784 msedge.exe 83 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 5388 784 msedge.exe 84 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85 PID 784 wrote to memory of 2716 784 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.bing.com/ck/a?!&&p=960b7120f16ad795d8d9800e7568ed9c4f5aff49deb29080fd13537169253734JmltdHM9MTc0MzU1MjAwMA&ptn=3&ver=2&hsh=4&fclid=398003b5-09ee-6098-03ce-174908b861c8&u=a1aHR0cHM6Ly9zdWVzdHVya2lzaGFkdmVudHVyZXMuY29tL215LW1vc3QtdW51c3VhbC1iaXJ0aGRheS8&#POP=ZWVyb0B5b2xvLmNvbQ1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x28c,0x7fff3ef1f208,0x7fff3ef1f214,0x7fff3ef1f2202⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1872,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2156,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2444,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4848,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4344,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=3768 /prefetch:82⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5012,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=3732 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5500,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5756,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6236,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6364,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6276 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5816,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:82⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6300,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6400 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6292,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6444 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5732,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6584,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6160,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6492,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=788 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5996,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5460,i,17338481879572609106,1328566393473647433,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD577532bfc14c90e92c2c117f6625e41d1
SHA17ba952d5e18485d66976547fb8f47b2aaffeab80
SHA256587fe94912145359072577e01c7fe95e0fd4e6972e35f0a6a4d464382d8237f7
SHA5121b1b9ed2c3012cb6371b05681acf995a15feab32f0bc860bd4c441c1a1dcd8bd1a9fc7985fd10c16674ee7423a86c479a241dd5d1c843fb70962504db0eb82a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5ecf771f72aa9ce9673b53c13e4fa2db8
SHA1f7ed2c2ff4ebf08b93fbde50581bbcc34489fbe2
SHA2567ee29a5dac3ebc4d9dfac4a44c1174ef980acaa08f833ff69170f280d4415c0c
SHA5123d15ec58a01b14543b228de466c8eb9d5d738752596d1f871c75e456af9e88e32c704ced8fcd4067c08cc6b73625d4cb9f64f21b0eabaf4802da21a25e5f35fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5830fe.TMP
Filesize3KB
MD5b67e20b5a323c4198e344d47a343cef2
SHA122fa4d09995ed3af1744d94dc69838f91939d1fa
SHA256c8796d763a6dbaa0c96faa0e69b4b9129f37f37293edaa1cb20d9a506e8964bb
SHA512b358e3f19cc5df58519b30db19eb1f23a898853b16c8da0d6b3fef3b469e2997174b8a0b966de07150a6c396760fa3145b842086d1660de32985ee57d69013de
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
5KB
MD5b299eb52e3db1a832c2110c1c209954f
SHA1798f3b81b037055550d304c6c1d70eab760b8f11
SHA256a37bb1a104fd4b795697898820871a40c2d5986fc177d4060e16e19c57988221
SHA5129cfc0c3eb370e980e880d08869f0d13de7b1a3cf8f0a81a1a062c727513cdfc23072e6c65c083d5f7892b3f2568b77eecfcc6a0099ec2fdc3b239d116b995a23
-
Filesize
5KB
MD59abe0f38312128d5a3fbd0679f3b7b7e
SHA161936e15c9a5b3c6060041f36f06d79075fbdf9b
SHA2563e9b964398d49f87199e7d5d8246d76bb9f5e3babb2637e48c492ca4d0d5eb93
SHA51215a33cdd1857c8d9bda01ee6a6f5161a769c0de250e80e593b90c65b656c559ebdbc3e987a24c32a81575bea303d5e4650e6b434d88c305905160187b080dbaa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD508990ea0f24d706984380623834ba4e6
SHA1caf7321f507156b03f268cb647d31932ffb2c4a6
SHA2565c579980ef265e848011dca2ca19d9839edbf747a230173614080070c64ce716
SHA512cc6da5cc45e6167c082f7007639cf6dae47f3ebd6c5c4152684f460355f1ef3a121f6df8ce67fac70a28b3e110d18f147a178bc541a1c77aa257310e34a0c8c4
-
Filesize
16KB
MD5dff1f7f5525344acc04f9ea8ed48ff98
SHA180a312c51a8b99aa5a90dfc82eeaa53acc456c39
SHA256b6cd92cc0809ddb3fcef2b5a08025eb869289e321888c6112df5ff8f9c064bf0
SHA512b2c1b5585d4fd4937100a4a50a10a1765b07444f1ccb321be5ec17f6c2f6c680bf5fa80b6f43cc5f9e576815db11967477fc2cafbcff2ff0ed0b8cb2b5a1ab4f
-
Filesize
36KB
MD533252b4fb683d79e11fc169c2ce0a373
SHA16c78f10a63c748ebf2b8f1ab0aa357327a50bcb3
SHA25677b96c3c9e6134cb2dd3b141b5c62d6f8eb8946fbb78be6ea5b70a0c908e81e9
SHA512877e0671d1e270f9a5905aeba8ef0e4fc6e99c9048b7e19d0bc502b66b8fbea97e11169016ac2d3bdfcecb6ee9ed3540b3211745d68c498a79c44338f2e05510
-
Filesize
21KB
MD56781c98d5073245b3855afdb7c54a0b0
SHA1aa4f52157b51400321e76d17ce7ae08408dd3dbc
SHA256993291be69d44210b892b72fe960a2184379fc5f45042e5e58a7b4dd1c4931aa
SHA512bf911c82485f5f501516996280295885eacd75777c3accdeb8d5e808a5848054af8995e435d09570466c2eb6d5050883a9070d2d4cf2a8cf741ca963f71bfc18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ce6045c7-5845-44c9-9d42-2d539df504d9.tmp
Filesize16KB
MD595b47d5d6a7f9d386b59a36a43a171ab
SHA1521821c781220ce65d01ebafeed1fbd33dd4fa06
SHA256a23d9b94600b5246d447113d008e49c110c97e2b9d2c19a51808ad2851e6f890
SHA512dd3628812171325f26d391d96dc40588f9d32efb103c076ba5c9faddab6a81be0ee9ed988927094f4d70659a7727154c9d0c980cb4377565c6f4b62205c0a072
-
Filesize
23KB
MD5470758d5c700b0d1a183a1e35d276594
SHA17bf5acaf5b43fbe3a8973152cede13b2e237ec3f
SHA256cc7f38122c6afa4e845cbf0ee2aa03b71ca03b54217f718703e9f37ba803ec80
SHA512b895028c18de63715f02b8c7a4f8b01cc38cabb21a6f045e70db75aa06d9cca05f0d39f4f0b51f5bf104b96905f52d041c2ae6ae7743c42554cfdcaa88078d29
-
Filesize
900B
MD5bc22685aa84c1ba7785a1c3c97574e2d
SHA11ba33770a742effc2804a356b468b2f1f9191a91
SHA256b6c9a84523f20226d08c508cae9c7c35007a73e4f555f85918553f7291a6646d
SHA512c6a805a685656ef7bfb3f80a5526f55dc140f44e87fa20c76edb26ca124440bf6225ba4b62ba05ffb42d139fbfa7cc7dcfda72cec038db0e8b7a1ac8d35f08e7
-
Filesize
467B
MD55f7404f91dc810bd5ec278c984169236
SHA17138cc7a27e695a3d7470f92e3ee19761daf09dc
SHA256a9799981972d45d112fafa36ee3242dcc35c699a7b72097af9aca3dd56be5467
SHA51264bd705ed04d33113bf06795e982be48f4b381ac88d55dfd7b405571a870c92e535369d4564ef5b82485370865c66d2611c925909552bd9d2bce8459de19bac5
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD5073109581f1caab690f3eedfa9fdea40
SHA13c3b13bceb3b45ff8bc4a0d9fa457ce1b683f771
SHA2561303245e1c833e00617dbb9998814e1ce494937236c7a7ef8fbb5fe47be442e0
SHA512276b004072352391ce75bbd1e6a9093097a002e6752df7bb5d7307ef3b6bb36c9cae166a242415bca17a409e8a35a86df323268070f1a5608a78fa2ce7604650
-
Filesize
41KB
MD5c9ec5e3e2f0d10e0026f1ac0b613c26b
SHA1c495f5e3eac8ac5170c519508b1ca30ed3cea299
SHA2562f9e2e73bbaccefeb4ede73f39088b9f242482f3dc7ff325713d76d89a46b804
SHA5123a53c712c3371f0b345eb4f0294094821503336438cd9e5248b4b5b4537e70e3f5d0123e7801fd85f915b1233e71b3bfd9d05ca67891bb400bc52fe54677da39
-
Filesize
41KB
MD5029c8f0c6bcb0473843536698c3da16a
SHA169213e9f57b8db5559fa4a408617ea2c820d7012
SHA256a55e09ea45ee358cbc228fabe7c046f09ce06ce021cda0e99767ab45b2ee83cf
SHA5126eb5a3fb71d3cc9ae41387a1117ea0ab267b10d84420f4fc622d02cf026348166d336bc08d9059992a645428a578e21bbd0fb83c8fe239c33ff4ba8ea55e188e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5b8028d6ff1c2d3951b42163c1ff6ca1d
SHA1311c563bda7869a69917b099a986c65b8086889e
SHA25682b7e77523e89f0a69ab14721aa7d9f84d4b4c4e6fc41fca0763d23ebdaea355
SHA5125b38436f388b849c809b5c163c308c8818527a13b0fd7aab3ce034e0b7f26d97dbef5b3f91e50c9f9128f79cb3ec1eb8c91a1cdfc1d4049ebeb991d67d4d3273
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c