Overview
overview
7Static
static
3Iаuncher_v9.1.rar
windows11-21h2-x64
1License Te...ig.xml
windows11-21h2-x64
4License Te...NU.txt
windows11-21h2-x64
3SDK/Assemb...ce.txt
windows11-21h2-x64
3SDK/Assemb...MO.txt
windows11-21h2-x64
3SDK/Assemb...vc.txt
windows11-21h2-x64
3SDK/Assemb...fo.xml
windows11-21h2-x64
4SDK/Assemb...ed.xml
windows11-21h2-x64
4SDK/Assemb...mf.xml
windows11-21h2-x64
4SDK/Assemb...er.xml
windows11-21h2-x64
4SDK/Assemb...or.xml
windows11-21h2-x64
4SDK/Assemb...fc.xml
windows11-21h2-x64
4SDK/Assemb...ty.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...mo.xml
windows11-21h2-x64
4SDK/Assemb...ed.xml
windows11-21h2-x64
7SDK/Assemb...um.xml
windows11-21h2-x64
4SDK/Assemb...nt.xml
windows11-21h2-x64
4SDK/Assemb...es.dll
windows11-21h2-x64
1SDK/Assemb...es.dll
windows11-21h2-x64
1Shared/Mic...es.dll
windows11-21h2-x64
1Shared/Res...70.dll
windows11-21h2-x64
1Shared/Res...70.dll
windows11-21h2-x64
1Shared/instapi110.dll
windows11-21h2-x64
3Shared/sqldk.dll
windows11-21h2-x64
3Shared/sqllang.dll
windows11-21h2-x64
3Shared/sqllangsvc.dll
windows11-21h2-x64
3Shared/sqlos1.dll
windows11-21h2-x64
3Shared/sqltses.dll
windows11-21h2-x64
3Shared/xe.dll
windows11-21h2-x64
3Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
Iаuncher_v9.1.rar
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
License Terms/151/LocalDB/Binn/localdbxeventconfig.xml
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
License Terms/License_SQLNCLI_ENU.txt
Resource
win11-20250410-en
Behavioral task
behavioral4
Sample
SDK/Assemblies/Redist_TSqlLanguageService.txt
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
SDK/Assemblies/ru/License_SMO.txt
Resource
win11-20250410-en
Behavioral task
behavioral6
Sample
SDK/Assemblies/ru/License_TSqlLangSvc.txt
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfo.xml
Resource
win11-20250410-en
Behavioral task
behavioral8
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfoExtended.xml
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Dmf.xml
Resource
win11-20250410-en
Behavioral task
behavioral10
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.DmfSqlClrWrapper.xml
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Collector.xml
Resource
win11-20250410-en
Behavioral task
behavioral12
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Sdk.Sfc.xml
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.Utility.xml
Resource
win11-20250410-en
Behavioral task
behavioral14
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Management.UtilityEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.RegSvrEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral16
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.ServiceBrokerEnum.xml
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Smo.xml
Resource
win11-20250410-en
Behavioral task
behavioral18
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SmoExtended.xml
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SqlEnum.xml
Resource
win11-20250411-en
Behavioral task
behavioral20
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.SqlWmiManagement.xml
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.TransactSql.ScriptDom.Resources.dll
Resource
win11-20250410-en
Behavioral task
behavioral22
Sample
SDK/Assemblies/ru/Microsoft.SqlServer.Types.Resources.dll
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
Shared/Microsoft.SqlServer.Types.dll
Resource
win11-20250410-en
Behavioral task
behavioral24
Sample
Shared/Resources/1033/sqlevn70.dll
Resource
win11-20250410-en
Behavioral task
behavioral25
Sample
Shared/Resources/1049/sqlevn70.dll
Resource
win11-20250410-en
Behavioral task
behavioral26
Sample
Shared/instapi110.dll
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
Shared/sqldk.dll
Resource
win11-20250410-en
Behavioral task
behavioral28
Sample
Shared/sqllang.dll
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
Shared/sqllangsvc.dll
Resource
win11-20250410-en
Behavioral task
behavioral30
Sample
Shared/sqlos1.dll
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
Shared/sqltses.dll
Resource
win11-20250410-en
Behavioral task
behavioral32
Sample
Shared/xe.dll
Resource
win11-20250410-en
General
-
Target
SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfoExtended.xml
-
Size
69KB
-
MD5
dc0173e14682196f8efc27b79074affd
-
SHA1
2080e6275e6b8700659c4e5b706f9e57713d2aa0
-
SHA256
af62e11a7e65b0d168a36bf350f05d8ba19f583f97f8730f7e10b59fe20ef54b
-
SHA512
babb90d03ec8d41fb4b5214dcee1d4d7b894e76b407b1b8da6e9ca418ab0b3e0ee6d896635da39378c8387a24812a7e098b816b8fbe5ee51bbe2b5cf6de0dfc1
-
SSDEEP
768:qASe5+5G5K5m6kczsW/V6WBTWfxdLXtY9xAErt8jF2ZnNjqa/LO1p+UulmGqGMzc:+HkM6WhWihBj8Xo
Malware Config
Signatures
-
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_425399128\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_174584779\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_174584779\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_174584779\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_174584779\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_633265237\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_633265237\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_633265237\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_174584779\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_633265237\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_633265237\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_425399128\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4204_425399128\typosquatting_list.pb msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31175387" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "3646702088" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133897013866747589" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4144164418-4152157973-2926181071-1000\{5E1AA33B-E9C4-476C-8413-6C4537466C4D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1640 2524 MSOXMLED.EXE 78 PID 2524 wrote to memory of 1640 2524 MSOXMLED.EXE 78 PID 1640 wrote to memory of 4204 1640 iexplore.exe 81 PID 1640 wrote to memory of 4204 1640 iexplore.exe 81 PID 4204 wrote to memory of 3220 4204 msedge.exe 82 PID 4204 wrote to memory of 3220 4204 msedge.exe 82 PID 4204 wrote to memory of 3692 4204 msedge.exe 83 PID 4204 wrote to memory of 3692 4204 msedge.exe 83 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 5092 4204 msedge.exe 84 PID 4204 wrote to memory of 2920 4204 msedge.exe 85 PID 4204 wrote to memory of 2920 4204 msedge.exe 85 PID 4204 wrote to memory of 2920 4204 msedge.exe 85 PID 4204 wrote to memory of 2920 4204 msedge.exe 85 PID 4204 wrote to memory of 2920 4204 msedge.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SDK\Assemblies\ru\Microsoft.SqlServer.ConnectionInfoExtended.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SDK\Assemblies\ru\Microsoft.SqlServer.ConnectionInfoExtended.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" -- "file:///C:/Users/Admin/AppData/Local/Temp/SDK/Assemblies/ru/Microsoft.SqlServer.ConnectionInfoExtended.xml"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x350,0x7ffc1d3ff208,0x7ffc1d3ff214,0x7ffc1d3ff2204⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1836,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=2204 /prefetch:114⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2176,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2540,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:134⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3440,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:14⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:14⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4928,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=4732 /prefetch:144⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4932,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:144⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5632 /prefetch:144⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11285⤵PID:2296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5624,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:144⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5624,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:144⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5764,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:144⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5748,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5876 /prefetch:144⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5780 /prefetch:144⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:144⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:144⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5000,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:144⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4172,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5604 /prefetch:144⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6132,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:144⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4956,i,2203788735187636746,8667803594694470452,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:104⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3492
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD59e4597d6e9951c90f605fa4a330843b2
SHA1c9a4c72aba3b9584e03d0db43aee91e51094c369
SHA256272d838982199dc905b6eea7f57fc331c216efacab7d865cf427fa4972aff009
SHA512adbf3948d11ce019ee5a0e8971b7b08567c7a3de742e03274ae0bd868f64f4d09e93e91e38681b34eb017af7d4708e5484b776b9b3828715d05f35621423fe05
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD5821049ff6f1b0345f75b02d93cc6aa40
SHA1a554dc151ea5bb9cd77e906a03afd4cbf2fcedd6
SHA2564d6a5a82630826d541e2abe88a49938bc2bd88857c0fd24b90ae06d0b0d47558
SHA5122c3ee47c08ada05eabf0bea86a63f559da738f0f70b5213d0c91debac8ad6f8c7b15b6c6ca87105cb2baa9493c6dec92ab3ebf336f596d0ae7fb60bc82bc85b6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD560818c8dff8d3f25f8902a3ce67ceddb
SHA1db52a1a0e0df66020ee1b8b5c2b3c22220b8eb39
SHA25659ee3350b118f4c146337b3b2bcacb699ac903c654fa76418e1e897c665e6081
SHA5120cd5168f445a80297a190d27d1ac0ee8e3bb651fb339e392ab7235235b813c3980888ee6710f89650358578f3947e6397e478aaecefe8d022e25cd6487b1ba4c
-
Filesize
37KB
MD502a5e883ecbec6f479216750aa3ec297
SHA1106f5412a3aa49b350b071a61711b098d95a4da5
SHA256e6c6e31ec5ddb754668531ec52f26724f378e55b2caa03428b11ad6def953537
SHA512d95213ba7ec1deefc38c9c7624f15a3eea4cc7ea6073af0193a0f37c9f667c95352cec6365af415873db16e2f784e0b5e1ce9b6fc8ddfd827a7299f6718130ca
-
Filesize
22KB
MD5d086dc66022a6b8cd84ee21aa2974a03
SHA1a0c79ca265a84b7a4625f120af298266c8408356
SHA256446101b2a4908b5757a54693ea1e6a0a5457ab18e22dc4ba47447b98117da8c6
SHA512f676ba638389e7cc779efe2b75bbaee46b6e861c76f7eb8eac0bc151acc7bca3d929ee81545ab10c0048c718d80313f3212de78a011b6942e7b5a5bd4f2c1215
-
Filesize
465B
MD560a8d77f67d31001b57f0bec65624443
SHA16dace88f551823d46be340384f600e9c51abe15a
SHA256894ed5138bf2779359b7a49607aff4ab29fb5578478b7050e3d421b9535a5edc
SHA5126fb72485fce3fe06474a8a0ef9daa5f0b1e7779b2704c8cbd90c83379d89052b45f169bbd7db949bac06f695b919c116a614b63f099483dbfd8bd90955822411
-
Filesize
898B
MD5451e1b205f5319b605aa0123f872174d
SHA13563af45015e3a3f33ceb3c92e913fe17d573a3f
SHA2566f1d3594f66defdaa662956cc0718dcf3a8d35f736f8dd26e901352900fc46be
SHA512b537e1f30efdc7f2def9cf4335a9202769ba038102232720dc434e25235ccbed781efa8f8afd312f3db258cde6aaff1322908ea44da1abbbe257a5f59c7a2cae
-
Filesize
20KB
MD50a8f5883c74c6c7a76859c3cea5c16cc
SHA16b1b18a63ec77bd535666ba378f73c39f6bdee20
SHA2562c3408e1b8621254547f464e1bd219120438d3443ebb24a5b656530052bb8485
SHA51248469651018b43d91315fd9652b35a17372fe96e4fd6c9b72e647a82db9585a2346f864d806d564e209017ad230cfbf0d6d67e2d2708530ebb289b308200d327
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
54KB
MD556c6fe6143e9f6a3fdf6484e012b6fcd
SHA122791a0cdac1f135330f696946d5e5815c1917b7
SHA25681fcdf7f5864a8fe9045a63299ecd6cdaecbcf7df992b3d87373af0ce638cf50
SHA512f03023c804f756b1747f5c01da711ea957cb01f137d0601d539545a9cbb90e0f773c9cfa88fac126ea8e40b9d18b922275a65ae1baceff0b3b399cdc1811c958
-
Filesize
41KB
MD507919aa4d9bb7d278613bdb9046100ef
SHA1ae58a2906cca6e500e240446626cde973f012a9d
SHA256b10b0e27fe256341b75c20930d44f76f527610912161cb03668c4a8457df3efc
SHA5127662679b4138433d4518246ddf6ab560d8655a6a6afa4c894ff078b3bcd9f211b6f365dead2fc0b48648978542655b7d4524c3de428e92adedf30881d2cd9009
-
Filesize
40KB
MD59eab62f541d3060da6cdfdb84618e068
SHA12c2f20074afd9408474b9f99f3b32b03f6c179ea
SHA25640d9291c2bd2b0ed76591041f2993e796de9bf1ace3312c203b8bc1edea128ad
SHA5121daa57c3ba36bbd418bd5186770bf1c2d48194d21883bfacdb3c23de038ff885708cdd54f53bd9e924cf13bb0555d20294b267ae68e6f1d7ead2b644ae7d5c02
-
Filesize
49KB
MD54ac3f7ce4e12e01d3d8722e4b3657916
SHA15cf178716a4965e9899723f47c6b192a2d783f76
SHA256d32f15fb266340e7570f170b5a1afae055798f8dca2c87637381d444eeb49528
SHA512bae0e0d8536e46dd894d3c49df7bd7f108b891fc8c06123756925085aaab9df5e7b80e90da7af04724c35397dc7ab4cdfb34ab3cf871cb45d97a942b1ac46d90
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.21.1\typosquatting_list.pb
Filesize623KB
MD5b5467605f1d5600fe6d540ebbad3c3a7
SHA14c52cfde3375a6fee3c1bafc6deecf77015ab154
SHA256f58fec5a101bcd710e42c4df00fd8064805fbedcab030eddab6b636f9f5efce1
SHA5120554b2eade8dee9ed85f196530b9f45cb261e1232b3fe1f3c8f9bf584b9b0334f09f7c9d7ad8b9daa776d82bb71093c48e81bdc6fb1f3d7b7991b96875e696f5
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
118B
MD503e6b705075692ba847a04282c612238
SHA1c49e349819bc7d2ce591fbae49377d11baebc943
SHA256afd2af664504604698242823a388751ca6e84102ab752716d3bf8b1e5440d24a
SHA51228920c512a7b0c505b87bb90692ce0188f78f43da487d4dffbbbcc7c05cf853e238ebcc01166a7e56f3d65f2372ff7b10502b8daac472b303529d2db77326a04
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a