Analysis
-
max time kernel
71s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 18:35
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 277 5744 msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133891293337927970" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-83325578-304917428-1200496059-1000\{D2A53B98-1A72-4E2B-9DF6-A1D1E2BD6AD3} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 5648 1976 msedge.exe 85 PID 1976 wrote to memory of 5648 1976 msedge.exe 85 PID 1976 wrote to memory of 5744 1976 msedge.exe 86 PID 1976 wrote to memory of 5744 1976 msedge.exe 86 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 6004 1976 msedge.exe 87 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88 PID 1976 wrote to memory of 4040 1976 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://prezi.com/i/euqlg7zvd0cu/1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2d8,0x7ffb3f8cf208,0x7ffb3f8cf214,0x7ffb3f8cf2202⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1784,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Detected potential entity reuse from brand MICROSOFT.
PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2332,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=2328 /prefetch:22⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2352,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3480,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3516,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4216,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4244,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3716,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=3668 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5356,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5540,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4220,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5696,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4640,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4640,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6456,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:82⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6468,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6712 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6728,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6640 /prefetch:12⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6760,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6748,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6620 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6764,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6904 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6920,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6932 /prefetch:82⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6928,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=7236 /prefetch:82⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6204,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=7392 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7404,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=7484 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7140,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=7244 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=5412,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=6964,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=6932 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6852,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=4536 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4560,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4548,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=7568 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4532,i,10762331809694804516,3457397440916800495,262144 --variations-seed-version --mojo-platform-channel-handle=7616 /prefetch:82⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6116
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD56e82345aefe362b4c5071e7df6c07407
SHA144176a6b5c2722280699b8cc9a174d168fd4c161
SHA256ee1ec48b6b166582c51a4141a84f48731ce18a62e4b7faeb9d60560c8f9c382a
SHA51220c0f5862226a3eb17832e7c793f809f2333e0e0068dbe61b5865517fdd9f84bb5ca8d97bdb19a005a25b789ac75a09067350940f042fb5123cdb682ce2c98d5
-
Filesize
280B
MD55a7e1750438748bd333b79a94ca69b2a
SHA194fd1be56969e269ce195ba29c3d464d356d6556
SHA2566d7a64a318c25c643323d5cf1c0c80ccf2f2433e7d74b722fca90468f8f9b914
SHA512842509c0f495ee24d152ab3f7867183d7cd64b01b5a9305405682abbbff3aa18a8ad7d97ee039393fdd1766fc17ad2df1caf711dc4db8dc7b9df608ffc0fdc7e
-
Filesize
280B
MD5eec55fe349980566b1dbf1d409d28c3e
SHA1654ce4b550defea0851f12e8ff81ae9298bb3f60
SHA2562e81ea3d7ddfc0274f3955d5131143c481e63f2529514c5295873b393d508efe
SHA51258e02658d08732b5f36e868331a483b5fde15475a6c5f704a19c97d920399c3f7d41a8fa163c66683bf403598f8f48f0cf9fa468f9783fcabd9136a55cec0059
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
11KB
MD5957f92108e322a5c4793e498f803ad26
SHA18ec39a1f58fbc0352cacda862a3ae556e2bb6a24
SHA2562fa6b9bfef23dfb885a6d5bbadcd7420cce9595d3c35811914c7df475cc9aeda
SHA512b0dbe231897d5f8e0794751984c07c8447572a1739568432a60909e82686e029e21945911b094f3cad6f944ce5e1a60c9097799562ae987c20a9c0ea94b7c2bd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16KB
MD519766a02574e9b120a5189a02f300952
SHA1144563228cc88d766845dcd775cd1fc353fd481b
SHA25642b166d53ddc93addba7c5d5af3c91d2052937fa7f95842a60e434b953be568e
SHA51287ba985ea675c3b42cdb9fc14edca05e6ff1b331aed9fd9a1654975de2f24e4c30f66249c07cb4b37fc36c1851b57fbf852104f00621a641595e750bafa08141
-
Filesize
17KB
MD52c201fd5e83161ef29b79af0522711fe
SHA1e374d2118cf5ca5160289895e8171cad05010ca9
SHA2562cae60b17aa4f09239427c7bc57048a829e37c45a16ba0e08f6e4eeb63b79060
SHA512d3489cf9d94f5d00bc5c2bb1910c313069d806c8a151f0b34296f08d07ee7a8499b70aae742765d39403d711f64f84af710925b78603fd71de5e4ccd62f17ec9
-
Filesize
36KB
MD5a9d222ad529f36603e3dc972257479fc
SHA19a606d13370abf9ff4fdc5cfc565cfb67dd0bf3a
SHA256f54b8646d593a02161903c9e7db627ea200a7ac943bf0f125ecf02c2b807d5c3
SHA512f8e56fca459a4a61bff906b3c39242b8b534cc782d558f49aae96fc2ea0c44d930fd8a0ea01ea450b5246e81cad525d219d785c27a336829a6bc88d2146b139d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c08d88e5e134d45bfd16884839f3328c
SHA15f2c640bc3bd14c6186bf2a502c5d8511bd1308d
SHA2561d13999dfe599803c7a6a6ca51c999a3f57343ccf259f4546cf8c31ad6be2b9c
SHA512d7809caa3bc12a6d9269a58f9c269c90b165361b799fe063368da729f3d2e49595d38db40b2b9f2ba80e91e2c29404f43de8077659950a3305a26e6d3bf4617d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57da52.TMP
Filesize48B
MD51d628889e17c191d4f26d49baa78177e
SHA1182ee47284d58560c62ba65aa789642f3f024ac0
SHA256163f9b72df115e4addf090db3ee604a2ead057becf076cd97989b9b2b0039e79
SHA51266f980bc52e1d266767862560fec8cb0713f9f00503b93f80300bcd61b70bc3d7d2d3486be1bcc6c3a006e7d7535109183cf08802b525d347bd6580bb5c5f5c8
-
Filesize
4KB
MD564e469a2b4b1ada473d0a971ace16151
SHA16c732364a9c2fb5780a16479bcab2dd93f7f2773
SHA2566865ded37611bf9f82c6899554f604a5eb17921dff726d152443ca6d512bfc5f
SHA512679ada93745c5c062aaee45c2b23a1c3733d3bb760b1c599b3f1a6fcf4f208a834c9b1c85434f1b15ee75c905d131df503ba4ddbf772f7bf548148c84c160630
-
Filesize
880B
MD563d269486b15c03b709955bdd3a36667
SHA1bf627e02123f400f4b67e12d6a8b1d506fe7aae6
SHA256d2a269d4748f3466da2644fce0dc6fd92e54a9b855926b52921e09422b03ff06
SHA5125cd152d87967d045a1b1d149253d87cc5d5dda80e41f37fa55a4af015e6c57dee3f9c1738da220d8861193760effa88de040159c4a65efbd3087fc690284205c
-
Filesize
23KB
MD5d59d776ba640264de066ef7eb41f2184
SHA1a5d16dd5ec12bbf55bc80edcf9e8e009d53c333f
SHA25641b14e72abbaaed3a6286795e7809a22309cc7a19db7da4d805c40d0b9bdc404
SHA512c02e27931cf5b6eb09acfa0f1045581d92f25766752e60a602bc49e1a9c4613349859094f1a16b284f6fbafa29bbda3d27ba9944385428a836fa9fa642d8bc73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5868f6.TMP
Filesize469B
MD59abb3c0f7c346b2fa8d47aa53dcce633
SHA10daf94c9d8dc92f399697b2362cc1d48a485f06c
SHA256c037e0688cf11399399a69d168b3d57cf4cdc00897156d0e4438d430f9e35643
SHA512cd6b0729df0e99a6100ec7352ab5a74b780552dd6283d9496c26ded3d5ad700ba6666d328fd75159eb6f488cf65a4055feffcb124834a62dc336345654f68298
-
Filesize
22KB
MD54ffe84249fde3c3eae2df64c7054c8c2
SHA175a2451affe0d1d5e1b16a52929dd83a006e9eda
SHA256e57d2ec9f10de4b92eb476ae08c40f9d082a68da68092306fc19e009091c1ee5
SHA51253c13a281374ab0f6a77e632165554186da63d4d1c1cc2b1a0bf493fe9e06f97715f1b3403bb856a3a6a9a272c836b03109a196d437696a71167124d3322c708
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe586c42.TMP
Filesize3KB
MD547430e0e9ad4838b6b88191b7966810f
SHA18933b4ce19e396751f93687305d3d378c48e2e0f
SHA25698c1f419b9efe0d2a9f4350442d90916bd07593d9ecde4706030d1502cfb90d2
SHA512e3a4e44240a11ce2173acfe66f6b52bdae8fc9c97dfdca441700ab47b5c73a46b71405da95a2cc08c34507fddf4349923c33da57da244e45b5019b9898e6b65c
-
Filesize
30KB
MD5045310ad8ad3f3ef76fb064c26ba28b9
SHA140bb62b96c597c1b458b6884b25a8566a6067981
SHA256623b28ebb58b365c7b172c4f39126dd39edf88962bd50b663a3fac54fe70c910
SHA512cdf45f4b763e568d1f9c9063092d21afb05be79ae52fbc39784ab838f82e14400d53a89fb82c10b17f44ec08af7d71a448e347afb38a0747446ad9497ddd1425
-
Filesize
6KB
MD532d816ee269cd0516844b2a9f0fa0bfe
SHA1f4b1ec34d101dc30b5125b6ace85a760c6b85c4a
SHA256a520cc37067b90863f1dae05b6ee851017828d080f5e8ca9de825a5d47e3f443
SHA512f9db82c7cd09828230b6bf862272f9684ef16bda4a55adbb87d390dc7e594fb67d3f8c7dce6827257182640b7f94c07fdcb181e428f21c495352c6bd39573d5e
-
Filesize
39KB
MD50742a9d00edeba65acc188c107db369a
SHA18738d1781755cafdab1a3ce8d0da833d6e24aa7f
SHA256cbd72fd9136cc6f05e2f8aaa34791f97b2c0142bef9916eb6c8c591133a1706d
SHA5125db163ee205e0550517b40aaed2437b2bf5aa7bd149424c5ff1db9d272690a7653c61d36d4c35269a426a8e170f7957b1a1fc179690983da498f404c325d63cc
-
Filesize
7KB
MD5af3039884ffb4cc01ec527895be51f00
SHA1b753eba361f7143160f9529618ac8daf8f4ea316
SHA256839d1c0971ac2c8c19b49d69a8179a3f2a2cd0c63a56d9f98373c24cf4891b7d
SHA5120b93cc0ce731bc352c103e336cca532a2bd2571f437d4f6cc60c333fa9330541f01fc8875b626500f0fad23598dc04a2d5f58c636671415debf16149b41e4ecd
-
Filesize
392B
MD50eba885923aa09856c357ae5fd35e69d
SHA11e822f2959c03ecdeb3903e01d35f7b836e15b14
SHA2568af7cd50b317bdd282482e06966c5b1386273fd15d8535a56c9e8d25a9bd3773
SHA51293df54229731bf831647e7622fef9aff3ed5abeadda2e1c586275bd91a5ce473ab251716eeffee6628910f43c28a9eabf196a507f1dc5e45632c853f2e59dcc7
-
Filesize
392B
MD532919bb101e3d223832d97d674b0adf0
SHA15beba0cfb749d42913392f708c1d735d8db136a1
SHA2565c2d57f946976f72573b90ca156922ca317305de5c05fab1c5daa73e6fa851dc
SHA512f0ae2773de550ad48187e268e3a35448ba73b34b1c8aa470a92aeb26cc7e63cc920fff59d1eee2c5dc71797e68658097278edf75be0a906e866a07473f4f3baf
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5d56f5879e3573c046f5994a6a9eecb6c
SHA198d8fc0eee3234c4e8914e3fa0f49f9346eae008
SHA256131948030bfae7f37318ef68f910b8d11814416714636bc76915158b54022c51
SHA512c9edf65a9884336db224cd3f4ffabc2afac504336a00ea641c1e2a8a968420b18cde80d9b4671207374f35b4b3301c9d2a0a2db60fe8d90d5ac259cd7f316a82
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1976_1407137091\608e760c-e5cc-4e9a-aa47-93c5fc4fe93c.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de