Overview
overview
10Static
static
1NUEVA ORDE...3).zip
windows10-2004-x64
1a66e05684c...9c.eml
windows10-2004-x64
3Orden_NM04...df.rar
windows10-2004-x64
10Orden_NM04...df.exe
windows10-2004-x64
10Outlook-Icon.jpg
windows10-2004-x64
1Outlook-j1cm1hfd.png
windows10-2004-x64
1email-html-2.html
windows10-2004-x64
4email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2025, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
NUEVA ORDEN - NM049300 FERMAXIA-password(QKmLgls3).zip
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
a66e05684cd828e5a9b1771963a0121a13c7304a2a4037920dfb54d476575f9c.eml
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Orden_NM049300 FERMAXIA.pdf.rar
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
Orden_NM049300 FERMAXIA.pdf.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
Outlook-Icon.jpg
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
Outlook-j1cm1hfd.png
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20250502-en
General
-
Target
email-html-2.html
-
Size
9KB
-
MD5
772fa21b714bc471a4cd26f58b492a2b
-
SHA1
a26911ec7d84044e62cd442a19edd28af95140f5
-
SHA256
6e5f6b6f85fa72873074f9347f6888c7bdbd4d4dd598cf1b61bef37c71c6b876
-
SHA512
b4b65f171a19b8e1f143c1382665a9d95c236fcfd233887af3d8583eac81b93d0ea21ed34c85ce93f479e99958cb42f0d27030b9b356307dc73ea7c48a91bdc4
-
SSDEEP
96:ZEvAx9wQ2lQcQL7KQLnxKQLnKQLFXdDKQLdVgUlSHBamQLSLjKQLVKQMo4oP/ddJ:ZMlQv1nv5FXdNd+UlOBgSLtsywEPic
Malware Config
Signatures
-
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_119914495\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_119914495\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_621012138\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_621012138\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_321535481\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_119914495\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_621012138\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_321535481\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_321535481\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_321535481\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_546330535\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping628_546330535\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133919892033074442" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3623617754-4043701611-775564599-1000\{0329C4BE-36FD-437A-AEA8-3E29F40F91F4} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5836 msedge.exe 5836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 628 msedge.exe 628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 3912 628 msedge.exe 85 PID 628 wrote to memory of 3912 628 msedge.exe 85 PID 628 wrote to memory of 3680 628 msedge.exe 86 PID 628 wrote to memory of 3680 628 msedge.exe 86 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 3364 628 msedge.exe 87 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88 PID 628 wrote to memory of 812 628 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2ec,0x7ff81c11f208,0x7ff81c11f214,0x7ff81c11f2202⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1792,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2144,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2308,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3496,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3524,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4176,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4240,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:22⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3712,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5308,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4936,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5224,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6260,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6280 /prefetch:82⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6588,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6284 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6716,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6748,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6760 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6912,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6908 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6740,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6936 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4244,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4220,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6312,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5640,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5504,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=892,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=6160 /prefetch:82⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6160,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1632,i,11973922677079200570,12164731880659649166,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1244
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5e3657a3e5af17025e5b20b4931cce12d
SHA17da44598dee34ea617c2b72a2548a0d67673983a
SHA25627973aa04128f6fa460261f9f693e01c441ffec5803932411abdf934b1e8abac
SHA512f18af8e2466cb85cb07b18126b14fb18fd954909737a03bed2dec4e7300b2ffb2e79d4e1c786f68cea312e9725cb6dff4c85834abfd797505197258964e9e11b
-
Filesize
280B
MD5b99753da44b6438da8e7242bad3cff63
SHA1ff0646d30233e2108edcbd98f5a185a6eddb8e07
SHA2569ee28f735796661bd328fd87235ba49e01fc0bd7723d5e1660787b219b492f96
SHA51255a6014a7cc40300f43e2e1338812b1aa05b7e2ceca6ef6afe09ceac160bd64a8aad34e189ad8c58524b3e1065eab520b34ff94324e34d1ca9ca419b084021b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD57e5d347fd2ef38adce15f735669b525f
SHA13d2483355ac49ee5a8e9ddb7ed3f3279f7afb075
SHA256cd4a6b5f70bad2148684ebb37d739eca6641d7a7dd935fa9bfefa2286a168197
SHA5122e38379ddc25bcf82cbc64b6abe90a825e30cef1c66289b0983d31c751d75f71195d8a8ef2ea02e64cbe4896ee57e32cee468cb7edf90bf2889c94d86c48e358
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57ab24.TMP
Filesize3KB
MD520f61ed511c4ad4d64c862a896a6bdb3
SHA1030fa245a8fad84e13fc835ac2343830da6d12dc
SHA256d2ea99ada8067ff804ad378e5a5a7a1a0c510f9330acd49257cc7233c82fc05c
SHA512bdc70d0f31eed8e6cadbf4f6969fe99b251be9e68762e1cc26cdc84b5a71f819b20f193647bef051a2497b3c8f8a029b43a5c6835bd42e3c4a24ef7fc3d13779
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
108KB
MD506d55006c2dec078a94558b85ae01aef
SHA16a9b33e794b38153f67d433b30ac2a7cf66761e6
SHA256088bb586f79dd99c5311d14e1560bbe0bb56225a1b4432727d2183341c762bcd
SHA512ec190652af9c213ccbb823e69c21d769c64e3b9bae27bea97503c352163bf70f93c67cebbf327bfc73bfd632c9a3ae57283b6e4019af04750fe18a2410a68e60
-
Filesize
1KB
MD594db6589b1454abd6c26b30d0ccefd20
SHA1dcb3c22534a12faf57aae57278e16fb30525fbae
SHA25629f00a4d9c6b3b589a5cf602452c1a93133894ea412fa81712684c680567d6cf
SHA512da65b063e5611d16e11c491ad81624d7f8a66a649d4efb4e2278282c1f345efd2530cc2ac97d9451a985db93e0b4ae8af4f6cf2dc40a2c20879a987b8c864113
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
13KB
MD50fb5bbba647612c9ebd73204c01da871
SHA13b000ec71aaec319c7ac974a2e7a93ff0c442544
SHA256785a6d965bec1bcced03a9e051d573b599fc53303ad49645da81f4e75d7b10d8
SHA5128193e875f843e83fde3dad1b485b61cbfd6f25a5ec4b2576b1f5908e53a22eb0817f9f5b252a1e8d69839d60b5199aa6ab48efc48c1fdf4d8b4db73819d72aee
-
Filesize
14KB
MD59ae99e7d10a349333bf5a726966ddd27
SHA14ba0eec4d51c1576647de07a770f23ba02eeb396
SHA256160441abe66a6678c6ec91f3f9efce81339df94ffdf829a0c6d31f7762cb6706
SHA512a6b0e88b43ec1bbcc5771bb2e242b0528d1482525d3431a9f53cdcc1641e51f6b63649baebdae18508260d261490b392b37e500abdc37ec8af5c654aa63c9c5a
-
Filesize
36KB
MD5674be8624b5d2afa8361ef19deb9c9ec
SHA1628138516023d201f822b44bcc1f6cd50d10a38b
SHA256e8a5e811dbc336b9ff89c57eff4db79753402f68d7f742fba290dda1ad24b94c
SHA5124e66197b64141feaf45cf9b0390db4a5c539e241368abcfe88accf2ea1ea5ab1b7dc7e429aeb5b6343912bcb6e81e6bb2d1f1e9903a2a423a6973239ba97db53
-
Filesize
4KB
MD54ddabdd0ca940fb1c5540ca45143d649
SHA1e9314aefa48661938b6b909a49714e5249bbdcc8
SHA256e94ed20dcff37647a0c10c2211a0c63c1955ec0743a52dd98e76e01b0916010a
SHA51252e2fa4e89feccc777f7f307fdbefc9670f0b62c5906cabab80a4134950565392752c92d4f140e52a33f9189fdb874024ce11659cbc717bea2ead7aa8a7e5541
-
Filesize
23KB
MD57f490a266b03510cbf06c57c9b57654d
SHA1dc31ac6c54930aa5f5f4a1d1d03bb0528cc4fb4d
SHA256b509f5c09fc3e9651556223a7800955fdf1a429ecd6886c1e0ccebcb8ab6666a
SHA51261462485e048d238bd8340c028e0a2d8fec15f79f080ebcd7838277432f8fc19b3eb65972baa18553c601bc98ed8fe41f3a0d123c7cbca0ecd7ad4a9032f2fc1
-
Filesize
872B
MD50c1d28f6b5f21dd07599f36c8a3215e5
SHA11955ca3bb19a9d8e29d9abec231b4912d066c5ea
SHA2563c5e9c85672140df41cb0e76c5eef2ab1d17ea63d72989f36db3de2e26086ec4
SHA512297a3e9649c14d9dc74023eeea7fea15d3c3d16ba64c80d6bbeb4f883932020bce70500e995517a7681b77f9c8fc24b610cce6a548aa0bc461ec05e2520757c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5846a9.TMP
Filesize465B
MD5fd24c2423fc9a479da8398df3333b080
SHA11ea20ccd56be6de6f6344dba5ac5d1d233cf7ea2
SHA25632ec84891020149db336ef5b2818381f1f4671245cb9766166eaf2fbbf5f3ef3
SHA5125ad1726e30cf02679afefa3ca9b19fc6327c8d4d3e07edc4fcbf6f8e2e6da110d908ffec9f5581e935a201fdc8ef5730b6e403af2440bc5ca34c31a1ec03e7fd
-
Filesize
22KB
MD53bca8411b45106afaa963d562c371631
SHA178857d33a65e7061ca18a3540c304f01e7e85325
SHA2564503345ee70aa9ca0f90012b665743d7c13ec7052e7a943222287973b752b9c7
SHA512a6a7e9af6613a30730a0b87be76f87144a3483afb756445d462de7b22543027e5e8f5822e0337ba2d7b65e413e526da962783d05d226c0d13d113d57d28b56ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe5847d2.TMP
Filesize3KB
MD522ed3cc04fcc2e66b81335c4395971fd
SHA112ef48d70ec6f360644d2573dde99756f6ac05fb
SHA25627bffcff6642dfcb87ac33eea61059552bc35ccd3c0d9f4da550398351836df9
SHA5129219928d246a8aa761ee289b0baacc7214b028976b1b890c7f1df38ecac61cb3a90e8af1b3861929155d07af304d58ae8f7304466769669a7cd40c55ae61cf40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
29KB
MD5d09b3100d09f592aef8ace569ca391c4
SHA1bea8ad1457f38b1975681eccfe62f6a5304dd810
SHA256fc7df3dc7084f4c497dadec21ce68395e69462d824b0eca971089afe685d909e
SHA5121a82061084373f55818798eb32d863d84578db85d6fb237778267c5b68800c774d52188720dfdd587ecceec7fc1c3f607ad9ca2016f5580b95116845dcc604ab
-
Filesize
7KB
MD5c8d16572a971b1cf5a3a64f0ee8b29e5
SHA16ec38c77f5af6c1b0d05c75cce34fd43d34fe3c0
SHA256432e4baec474e87c6a1419c65a8d947e5270ea289880d9852e6c501d41b6c204
SHA51266e127911f361330d7a4a2ec87f4fae86f3e9bfc166062d900c987b759a0741436ab8355818a204ef2da0671e5cae39ed35661e70df5407946da559829880b6d
-
Filesize
33KB
MD56b315440776022a487cc00d89304babe
SHA1af4977d0a322d2b4f6a79f85141ca5dbb43319e4
SHA2564a8aeb46b2c87d6f5d6c0b7f5b23fe979a102e4c5b070c21fcb8a473cfa93933
SHA512a8880e7635c39277797c18a31dd72410c41bfad6c0020e36ddd98890202542bf64ee0a927f376f9a8f670db7a26213e3afe75e412d305b215648d7ef8ff42d1b
-
Filesize
6KB
MD5fbb5e5a88d26d6276173de13c8437aff
SHA127b11f6ac65bb5b256ce51566aa53691719cf639
SHA256c419be14a3f80a71b267da4e5972be4765dd5bd8258cb33099700119a51a4b27
SHA512e215a67890966e5dcf5eddb0fda597f94951bd5028470609a5842f56f1291545549247e74f0faf95b00492ffcf256ece7d6c4ba7f3024a37269abde532e88653
-
Filesize
29KB
MD52298215300c8595cb6cccd801d28f996
SHA18da2c78d4d0b89eec0fa885ee1d1c15b9dd1cd5f
SHA256443372f918c5c0adf8928eb1464a86f427955a8b89fcea3836d8e818408af074
SHA5129c194de393b5cdd5fde15ce8cc67d8ef8ee923236e691876dfdfe58de5aa09d51f09a79abdaeaa8510e9c51f64a85176b02b202bfb27846a1d0db09974cb9eb5
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD57616154a19cd80a6408b54ae556ab2cd
SHA1cca78f5341e1e1a30b3a5a93092fdf387f7d627e
SHA2569e64dd21db2c2819deb23e64bbe76901d74239b2461e9dbad19af6fd00326614
SHA512f071bcb5707b5140c70a1b5d2082f862c1a4b354e251c400301fb0a602567192513611b337c812c5deb5330e309bbb1ea6707b9a146904d8a129f52e2fcf4185
-
Filesize
153KB
MD5cc05ed3e66468e692745ba6563c69740
SHA1eae9dbd4d36aa91fd43f7d452ac3d252b103759d
SHA256fb1311fb7142825abacb3c7aedddf948f5c9b258e447c953ce0f7f4b19c6dfff
SHA5124b527db02d6ea36b914558a3e44fd3d15772bf2be4ba0a640bf70427af07dcde5ed6967930cc3624a244cfc82290f125eea2754812586216b3d5a37757ce8db4
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21