Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2025, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
Murder Myster 2 Hub.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Murder Myster 2 Hub.html
Resource
win11-20250410-en
General
-
Target
Murder Myster 2 Hub.html
-
Size
12KB
-
MD5
7e8785b112a2ce7261eff35b26ac0e92
-
SHA1
b570b0ebe790f82aeb6127e891b0e7657d49db77
-
SHA256
896608e54883504d4d0033e3f7c264004d21ce803498ab209c66970d4005894e
-
SHA512
e2935257e3c2fb75bf5ff799e5721a60febcd921684d905c1a8e5c0c8f60a0d8db4c3a7045608cf022408bb67b7683bc2420bd4eb4fc92d254a6b4420608b687
-
SSDEEP
384:OpRilUshGGzUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSi/43R5:OpRilUOGCfvOflS5/u01/8xWApJingq1
Malware Config
Signatures
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-hy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-sk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-te.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-en-gb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-ka.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-pa.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\adblock_snippet.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-af.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-cu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-sq.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-cy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-el.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Filtering Rules-CA msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-gl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-sl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-und-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-cs.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-hi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-lv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-mn-cyrl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-sv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-ta.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Filtering Rules-AA msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_2051984196\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1986816842\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-nn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-bn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-gu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-la.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-IT msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1986816842\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-bg.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-da.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-de-ch-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-fr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-nl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-or.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-tk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-de-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-de-1996.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Filtering Rules msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-DE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-FR msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-ZH msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-es.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-kn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-nb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-ES msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_2051984196\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-hu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-RU msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_2051984196\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-en-us.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-mr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-mul-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-pt.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_1782485649\Part-NL msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-et.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3188_622210853\hyph-lt.hyb msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133894860662211859" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2627618461-2240074273-3604016983-1000\{1E586196-DE79-4141-AE77-EAE80D037F78} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 576 msedge.exe 576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 5548 3188 msedge.exe 78 PID 3188 wrote to memory of 5548 3188 msedge.exe 78 PID 3188 wrote to memory of 3124 3188 msedge.exe 79 PID 3188 wrote to memory of 3124 3188 msedge.exe 79 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 5640 3188 msedge.exe 82 PID 3188 wrote to memory of 4968 3188 msedge.exe 80 PID 3188 wrote to memory of 4968 3188 msedge.exe 80 PID 3188 wrote to memory of 4968 3188 msedge.exe 80 PID 3188 wrote to memory of 4968 3188 msedge.exe 80 PID 3188 wrote to memory of 4968 3188 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Murder Myster 2 Hub.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f4,0x7ff9cb0df208,0x7ff9cb0df214,0x7ff9cb0df2202⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1808,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:112⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2384,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:132⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3388,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3396,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5012,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5040 /prefetch:142⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5000,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=732 /prefetch:142⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5020,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5100 /prefetch:142⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2080,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=920 /prefetch:142⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2764,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:142⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5184,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5420 /prefetch:142⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5776,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:142⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6004,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5820 /prefetch:142⤵PID:5764
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11283⤵PID:1828
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6320,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5920 /prefetch:142⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6320,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5920 /prefetch:142⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6352,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:142⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5008,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:142⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6748,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:142⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5700,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=4884 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6932,i,4983681197266041434,17781174198425603491,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:142⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5600
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2020
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD50c45ee0655e29b0a935a305e66bba8cf
SHA1ad52868d94ba826e1f0b9db56d8fb7ff1c8fff2e
SHA256d23f3010a3dd3688741250e254dd07d508883c099e1911c3e7d0854be85ca599
SHA512479b8d020e5f818a452c050f27488928faed74c6d329ab58befc860f5bf76878efcdd03bd0eb7b83f22afb4e74aa40c7a0d6bb29677cb4cc03ff4dbd2687bb2d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD51eb8d4405059f578cd10c152c50e564a
SHA1904d78f4452ba709be864c556b6c1fc4fc3cc96e
SHA256154e3d02de75335619fc5999903b9182a4b531cf9496343c865381bd79179541
SHA5124d64be786f17131b2a2e950e7aff866ae3a6c00bc1735b37de2b1c4e6de9a9d4854d00d04d630ed78f268c283f2ebe05c00ef123c2fb02563008229f74b7a317
-
Filesize
2KB
MD51c16223b066267e883681d985f689313
SHA1fc56ef82304bf7c650ecd3172bc4f7e2861e2d10
SHA256a5a9d9d267efef5f45e63b6e1775070affd5e41911df289d7a748a1d40cdc4f9
SHA51204626c9348b6be599c617860f638ec147839fe3920fed19cb6196ada280efbc51702015483270b3aab9ee4651102e7dcfa93e2e1ff86f97edaa6ba2a5972af30
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD51a992fb65aaa81c5c85084e5532b2967
SHA1cee1d0328622b0d4b4646295f04d5adb01d60522
SHA2567146c7586b4d91a92543a5bc017c4a99f9d7dc907f19b590961366c5a4eeac75
SHA512a43d58462db13ae33ed10be9cec28648536841acda732001949526ee837b740569dbbb575bd70cf6114a22d52edc6df24cb7f71d72ac5cfd21ca6d1b3e52f766
-
Filesize
15KB
MD5f36564b63243fe6d5e62cab6b0ec4f7a
SHA12e815b3cdcadc7b4d1cdeb30742d2b2c325062a4
SHA256cc083b8dbbe33a5adb066bb1088a56c7ceace36a80e2306947a093e350ddc087
SHA5122772c85d9795c3a079ce4583f5b9950b442cf8727d89126941048392aa8614a8490cd80ce0b9a4b677f0484875cd81abafd5208faaa618e9366e6c498006280b
-
Filesize
16KB
MD5537e9748d469e466711093be51e333f0
SHA195d601fadd6118fb38db2472c9ed63c8d0a3ea29
SHA256ae014600c5f2fabac6457e3f47498bcf55e3709d71c025be498f88e46d61c4c9
SHA512f4ddae3a39ae1ac15f7737c9b05f1723629690ad7f0caea2d7359fce190742830f32a2b635ddeab674a351a7dce222d460b5017cde50f0d92d84641ee7394079
-
Filesize
37KB
MD5fc680375352c2d390c58717684576188
SHA17253046f9300af7de3d9df41c5b7d9ad3f94080c
SHA256bc500cb58b91c6dba823c2d4309c5ce2431a0ed0a382d8ac427633246fe3a2bc
SHA5125243c7c86e92583d9658be42ffb85cbd95deb3536cde4d89a26239811698df2e8e3be18c248499fc7780e22e8abb4abbb0a882d43dc0dfdebcf36838d220b7d2
-
Filesize
22KB
MD5d06d792cbb030b43e1a2509c5e737b7e
SHA11ddc254d3aeb11c957a0d60a3e51de16c4c31ae1
SHA256a58f76978e3687d4d249720706ac675cf473d88b235302a170c14f0cc4e2c39e
SHA5128c5ce532535d94a0f95c1c6f08a1c13cd47b34a8cc8a3443d99117afcd2ddc3dea0aa828f64847dda0fdeefaedbe4626fc1b70ae19cffdac1d194aba09e84ebf
-
Filesize
465B
MD593ce5a455e869bd105fda9320b9cf7bf
SHA1a6f41bd93e779c2aada30b3b20a4570bab89bbfe
SHA256fa80ff12731b3f1d5b9d47559cf2b52943ca6fe1e504154cf97ebe32795f8b98
SHA512c9563f1862b9efb374591db0f8fe9849bf96b9e75007fe2c22186242d8b3527b6fd2784c25ae8ad5283494d27c3baabf3591ca50d839268b0123d405e83b7c2c
-
Filesize
20KB
MD5ef61226945f358791d79d7d55dc815b3
SHA17339a0a2348102db3b53ec97a98591abe318a964
SHA2564a0c18afb55e8a041a716a0e40ed0f2b87d74a1ec70ccb3866fed91048b3c29f
SHA5121d526ef6057f95f9cc3067434d1b74155114359e360444228af62f80071ff52fc69ea53e8633776eb2ca35bd216e835f98bf4cc95a42a7b28e777a240d4297a1
-
Filesize
896B
MD572d8a2c39362b58c0ae3ca7071acb035
SHA18df649c05748a083fc187421bac33f29c2def1c7
SHA256cbe8a61f58dff0a2c5b6b627c1623583a06a50de860ee2e4479d46c025fad5be
SHA512f9990b6f299ffde778033318eb4dcacb50ab9b9782c9392d1acd1961756f0372ddae24c44e09b42fc09eeee2be7b98717e01d85f7b021139965c4bff19fe90ac
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
41KB
MD51a1c580c58ab678ae5ce48bf38a9dadd
SHA1374e0dd6e8166957888d0003cde0c9572438e426
SHA2562034c4af8c6d417283e5e4342383bff5ea3294f596eec94012ebec502076f954
SHA5126e5714fc2887dd2678076fe9324fc0bb819111c5963bdd1c9ea5d5e63bf98b1b2ac03dde620785544769405e54dc6c6ed738529d518b529d87d627f9b5f030ea
-
Filesize
40KB
MD51db85af0c22f1a35e8f5775646212e4a
SHA15b2ee49eef458aaa4321ab834bfd2562872a3d29
SHA256b2ca801428d0b4c99c39d9a45a27ba312bd1c693c013bca1450e30167f7c2b16
SHA512c67eb1c22f9799dc7840c0556c5b7de6140bcc43f8a74a0904860622a487446ef2b740bd387eb576033cdb07053454b12d3be738464a7e7580f81d55123ca5ac
-
Filesize
40KB
MD53d5df02223719252311b21e03d6dca78
SHA1a89f267d526e8e46e4d56d24b835f2ad8b5bc3fc
SHA2568ddde2cce5055addac5c3963962e4a144ff82d8a73f441cce0b0905a690ce1ad
SHA5121cdba342bd7f540fb6f9c56623d2a57199ca5001ba7b19afbfaea873383b81295de861cbf8d672089821ff2236da6c5b740ac5a7be24da3c2f76a1141d5f907b
-
Filesize
41KB
MD5da78711e1c4ebb797dac872fee8ef162
SHA1fb288efdd2c9b53d1265a6c6787d5e7c7b755fd4
SHA25605113375350a599ec7942d529de15abba112f50f518fd5bcbffc614fcfa56a53
SHA5125c5c5e6402ed4940c4d18ddf89208936ec9cc3e6efd909245fe5944ba15240bdd43e5d2f25899d7aae650a228da1c47943f3b177a0a4b5576b2f331634417f7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.76\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.76\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.18.1\typosquatting_list.pb
Filesize623KB
MD59cc0b895391b57b727aa33c9726290fc
SHA15d0e6946979b7cae22fd9a02e1df69e1fdb73624
SHA256ee177ed63dc6421b74f786428dce7ab84f06e2d565399f96fc8c5a2186f6a9ef
SHA512af3137e5b62e207616c441425cdfa22d5bcb9e195ab2d59dba43b39f857e8ecd85b30aec9e45f5a7b6dc6470f073c1e0c2203dc8e3b384eebdeaf44d84f2e8d3
-
Filesize
116B
MD5d20acf8558cf23f01769cf4aa61237e0
SHA1c4b21384309b0ff177d9cd3aa4198ab327eb2993
SHA2563493b321a7fc5e183ed6f223ae55ce962541717d0b332d16bdc7cbcadf7e6f78
SHA51273d082cbd71f6d0f06c7afc1bf63ee41c9a8e501df3e56f21a551b2d369a0afc8306894c8e0a38d0324e2ac403ec506ac1ecd8e9b61a9cb27134a229ccb13725
-
Filesize
118B
MD595be3969ec6c6f9649430a301555a1f7
SHA149e369ec2e3b392879d6fbeaaa6752705044bf50
SHA256e00d423af4689db6f1b2efbd5e338f260bf1ed6799746855471e6006464a2216
SHA512ccf958beaf2890e878aa927ceec5dc78a680317662398c7e450f707b7f6403f44eaf1dc757692c02f09c590d5800c33c6963f60c3bfa02ae7844d66080418e29
-
Filesize
12B
MD5085a334bdb7c8e27b7d925a596bfc19a
SHA11e4ad53dc335af5c6a8da2e4b4a175f37fafe2f2
SHA256f51a7acfffec56d6751561966d947d3fd199b74528c07dabdcf5fcb33d5b2e85
SHA512c883cb43c97a136825c6fd143f539210c234c66f9b76dfd8431f6ff014094e20b9410d7462aadee2344df8ca158def6b9a807e7cadbdfa947f6f8592e7283e34
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0