Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/892424513931837483/1363158007537733873/COD?ex=68050353&is=6803b1d3&hm=52152cecebb46f33867eaf1565a8d423daa23aaab129920d1ddae9fbaad1033a&
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/892424513931837483/1363158007537733873/COD?ex=68050353&is=6803b1d3&hm=52152cecebb46f33867eaf1565a8d423daa23aaab129920d1ddae9fbaad1033a&
Resource
win11-20250410-en
General
-
Target
https://cdn.discordapp.com/attachments/892424513931837483/1363158007537733873/COD?ex=68050353&is=6803b1d3&hm=52152cecebb46f33867eaf1565a8d423daa23aaab129920d1ddae9fbaad1033a&
Malware Config
Signatures
-
Drops file in Windows directory 19 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_2087852670\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_2087852670\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_2087852670\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_635986992\data.txt msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_2087852670\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_252421036\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_1442585397\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_635986992\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_1442585397\typosquatting_list.pb msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_2087852670\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_252421036\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_252421036\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_1442585397\safety_tips.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_1442585397\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_635986992\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_252421036\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_252421036\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping740_1442585397\manifest.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133895475447347185" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4239789418-2672923313-1754393631-1000\{FC10EB61-0F28-463A-A247-EE41A362BD42} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\COD:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 5724 740 msedge.exe 78 PID 740 wrote to memory of 5724 740 msedge.exe 78 PID 740 wrote to memory of 3984 740 msedge.exe 79 PID 740 wrote to memory of 3984 740 msedge.exe 79 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 2372 740 msedge.exe 80 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81 PID 740 wrote to memory of 3372 740 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/892424513931837483/1363158007537733873/COD?ex=68050353&is=6803b1d3&hm=52152cecebb46f33867eaf1565a8d423daa23aaab129920d1ddae9fbaad1033a&1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x350,0x7ffdab47f208,0x7ffdab47f214,0x7ffdab47f2202⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1836,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:112⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2276,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1844,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=2324 /prefetch:132⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3500,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4864,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:142⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4872,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=4984 /prefetch:142⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5460,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5420,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:142⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:142⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:142⤵
- NTFS ADS
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6356,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6372 /prefetch:142⤵PID:5776
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11363⤵PID:5944
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6364,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:142⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6364,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:142⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6428,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6644 /prefetch:142⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6416,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6040 /prefetch:142⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6484,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:142⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5124,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=5116 /prefetch:142⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5208,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6576 /prefetch:142⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6572,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6568 /prefetch:142⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6228,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=852 /prefetch:142⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6564,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=6636 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5472,i,4726337942920190233,15050871412944153579,262144 --variations-seed-version --mojo-platform-channel-handle=3236 /prefetch:142⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4232
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5e93f7a7e895750f95a2b42200b2f4406
SHA1eb9edc7a2f5aff5ae1ef937ec351ae1adc59034f
SHA25616af01493a8deae2d5884e7a0b4e4cf7f9b67a1c762e6479679500cda4ac928d
SHA512de7167f6575862feec3e02150f1ac00ac9daed7528f3edb6dadb42266a27530ada41f7e2094ade3feb970ca8745e3c02a18e364c0e9ce04dee177472c1f5420a
-
Filesize
78KB
MD5dad3de929ead938c06eb48ccd746272d
SHA1b2526632c5473e33b7214648f6446b55bd88a27f
SHA2567b4ad3add4feaca35f26dce0261b19ae7ef92d3a2abd50c8a5b288f3eb0a275a
SHA5121233059b4b1aadffb228a9bbc486c8d6deee592f8667b1899b8246ab731d7cee8f2250e0ef5abcd27d88ec48376a5e9b9b0803f084260e342a0033d50e83d9f8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD53b4e2c99745bb26be92134033f774e43
SHA12c11bcf988b5be41c08138d2d035940c423b162e
SHA256f5f2a8e65a1b90fd42a7a272b209c4c777cdb15cf8d000771afb3dafeadf179e
SHA512c7d4f3c236f9d9a27970257a07fc930764c5ae0dca52abbfe0f44e40a46c948f16be5b15130434ed197f4aa626a92d43c03d8a9de9aec1ca5fd1872d10e060b3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5cf2b5552c9ed7d71f198b72fc6497d60
SHA1878381d9e3bc404049b07c7fc3e4010ece278eb1
SHA2562094c4cf6dc65abcee0cfe49d32282f97daac5ffb5a19932c88fb72424c7b01c
SHA51291a69a9e14a0566c1e6f2763af732a7c99b0b5cc25023ab6c9f01e44af27b14ee42d8096e70a7d0d871432e1f51b88e0a1c5e19f3411ebe635d8c9defbea6b76
-
Filesize
17KB
MD59ef8448d22422d0442acf0e7cbbb8c2c
SHA1566324cd7e6c2e13441dbb0044cd9d78799455eb
SHA256fb4aaa1d67c6b360619553e8a3f6a9954d77d7e073e3a2e2d8074c9f35413f20
SHA5123188561fafe37e143108ccd6a59e3c83c46a3cd973811af23ca0f606e0bf15cf610a5c42bd76c1868db85b7cb22bcdad94beaa7f8d6d3785f4efa9775f6f4cbb
-
Filesize
37KB
MD5da6f2a676f6db164cf9cdef7a6a1ee3b
SHA1476e52732d781a5767c65ff50ea0b9a16eb88ce1
SHA256187bbadbf2da99137a05a7f734117418b629b4576a24dc4fc3d5ff1b105f01e2
SHA5124090b9ca910430c1209315cf7be3771517a28e45c37f6403e3b4a013d78e0f419163d1790920161b25566f5edcece04b44dc20c9ce750d67f4f49e8a75ceac72
-
Filesize
22KB
MD575932d01053c70515b18eb773f9deb63
SHA1a96aab62b63aedabdc9041ffd9dd42ad760d844b
SHA2567186f5ef6e980f4251b4d452595d4bd831ad7ad81b6b34752c137adae8afd103
SHA5123c78aa187c8efe4f336cd359ee636f6af30aa3d408591016f5ec4843f574aa66ce2a17124b1ed74378a4952d1614b5bf1ec1fb4a762b5f41e16b55c614b4fbb3
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
469B
MD50028e8df7ae234cc827cf7e586ed2b2e
SHA16de376ddc163653aecaaecc8a0c9d52fd75c4784
SHA2569cdf9607fd1731476e8a0effaf2e91d593c8b1105710c0314ea6275f0f18e950
SHA5123ebbe999d1c1f83ed9d3cfde0680cc13aaa211716722a8c3aef8b60db5b261f60aea0ec7401ccc28002b841519591ac3000077c77f55e07804a624e1ca6fbd20
-
Filesize
20KB
MD58d617df1d0b7819060efe21e174c0b0e
SHA1c28dc855d40a64c5209528403aef3bc0b9222126
SHA256715d594965ed55bdef976e38778bffd8b044ff342c653ea3388f92fba24163af
SHA512dcd94737a340b5f78d8f8ba916fbb9f067a2fe66715d78fb4a86dc2cfdad9695acb332995186338266d33e4edbc2ee1033b6f3f7bbfb4d32e53f73cb6ed1c98b
-
Filesize
900B
MD5e5e41e449dd90e671b4e58da6b0bb016
SHA14870f2fe370a7e6c29a76b6bd945e82ad6e652e6
SHA25626404783cafcf62126267d9e5e71e81e792f788aef525d48aac7213cdc81d2ba
SHA5124d3794c9b9e60f4740fbbd3c1e7ab8978a7d4623ea53f4e3669aca664bd30ca308f72b3913691c61c3cdf9160d8fb691a5a2285a62f096d12094c8084873d82a
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
40KB
MD501f0e20c074e6343d0c594b045223053
SHA1c26445cb562668f2a0e0181fa4560c9b50ab97ed
SHA25629421e603ecd660386e0670bfb07ded22dae99820124a767bc44b48e6c161dda
SHA51226f3e6375364ef569c212ccd15815fb1f4037cf2900b2efe0011760b8f44d85bfcdfa8a583a444c253ee766ce181af5e1fc91f88a08a94f23e5377f3c36525e3
-
Filesize
40KB
MD5c2e63053b4b28a18e7c36232ec937d4e
SHA126dab8f6588ce4951c52a9880be3547f161a1366
SHA2565e2581bf7eb97841052214098912d5b5132dc13113d3b8ffb8471fa3cfae06aa
SHA512da2dd7d1d1bc28a40433fdceff3422e53ca74385b99eede069fbc9086f4fb93fb0fe9c5c2a752aa228c8f79c07aa7b5eac69bcae80b215647525defb687b659f
-
Filesize
49KB
MD52c15c69c0f1041e418deba4c8081452d
SHA18a4627ded11eda691000c165fbfe35bceca3a50c
SHA25649486a561f202e76e67c495ca3b37b52efd32116a122519eec9262cef5ac6754
SHA512e1de43400163d48ed1ff9f4b285a58bc21de55999f0dba0bef9f34389f205e5fab80a699971c3a6e4bd3b4dbfa840631de5a0f331c705ddc77c7a2821c80b201
-
Filesize
54KB
MD5697ceedbe53c5c708e9f2e7e7773c754
SHA1a1edfa4c59282e47f7d70600f4de6813705e66f2
SHA256da966bc989f2f5543e254ee7e3d0442fd5bcc89880c98774edb94091911075a4
SHA512a80952b7965e45d03e56000523ad33af741a8bd1a99033624528bf4c4c77ba0d03fc7dd3b8c2f813c386a965cbc8414ce49ed87828439314ff4e724bed0c690b
-
Filesize
163KB
MD5bd6846ffa7f4cf897b5323e4a5dcd551
SHA1a6596cdc8de199492791faa39ce6096cf39295cd
SHA256854b7eb22303ec3c920966732bc29f58140a82e1101dffe2702252af0f185666
SHA512aa19b278f7211ffaf16b14b59d509ce6b80708e2bb5af87d98848747de4cba13b6626135dd3ec7aabd51b4c2cfb46ed96800a520d2dae8af8105054b6cd40e0b
-
Filesize
3KB
MD517c10dbe88d84b9309e6d151923ce116
SHA19ad2553c061ddcc07e6f66ce4f9e30290c056bdf
SHA2563ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e
SHA512ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c
-
Filesize
210B
MD5b7e1a7ac17f8b3609b1e42d591832de4
SHA1bc96be0a3700cefa64b224c8ea88c2a3094f81f8
SHA2569d5c120ab0f06726d09777c713fd5b23bb68536e064e558ca19f82c82189609d
SHA512197f282efae9f6588947a3ab6d0be48387b457ef0853d2fffa5b7738635c0eaf16500983b279059c56773c4e629e840967fca38a630a30c1005505de3aeb4888
-
Filesize
72B
MD5a30b19bb414d78fff00fc7855d6ed5fd
SHA12a6408f2829e964c578751bf29ec4f702412c11e
SHA2569811cd3e1fbf80feb6a52ad2141fc1096165a100c2d5846dd48f9ed612c6fc9f
SHA51266b6db60e9e6f3059d1a47db14f05d35587aa2019bc06e6cf352dfbb237d9dfe6dce7cb21c9127320a7fdca5b9d3eb21e799abe6a926ae51b5f62cf646c30490
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff