Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
Resource
win10v2004-20220901-en
General
-
Target
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
-
Size
286KB
-
MD5
93ae065f559a891f6e3ea4abeb58d036
-
SHA1
073596e51d809e227aeb5984142e93c2526179c6
-
SHA256
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90
-
SHA512
47c13d211da60bba0ad0a5d90d820e16516e6c21f2ba0705f1c040598597a7e7295557b92f9a9cbe0cc87ba4769fe6a8572086247f82a26768b064d2c283d5d5
-
SSDEEP
6144:RDKW1Lgbdl0TBBvjc/TWawZq8CC95GpQWQByQWBoG2oJ:hh1Lk70TnvjcBwtCC7GprMGoGTJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\d3c2a36c-5517-42c8-9bf2-4107b8416384.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221021015301.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2424 msedge.exe 2424 msedge.exe 936 msedge.exe 936 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 5692 msedge.exe 5692 msedge.exe 5692 msedge.exe 5692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4580 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 936 4580 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 87 PID 4580 wrote to memory of 936 4580 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 87 PID 4580 wrote to memory of 952 4580 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 88 PID 4580 wrote to memory of 952 4580 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 88 PID 936 wrote to memory of 1232 936 msedge.exe 89 PID 936 wrote to memory of 1232 936 msedge.exe 89 PID 952 wrote to memory of 2280 952 msedge.exe 90 PID 952 wrote to memory of 2280 952 msedge.exe 90 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 952 wrote to memory of 4180 952 msedge.exe 92 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93 PID 936 wrote to memory of 748 936 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe"C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://badeshan.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffea0a46f8,0x7fffea0a4708,0x7fffea0a47183⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 /prefetch:83⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:13⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:13⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4304 /prefetch:13⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5308 /prefetch:83⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:13⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4388 /prefetch:13⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:13⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4036 /prefetch:83⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:13⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:13⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6300 /prefetch:83⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3740 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff7705f5460,0x7ff7705f5470,0x7ff7705f54804⤵PID:3940
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6300 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3824 /prefetch:83⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5436 /prefetch:83⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3136 /prefetch:83⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 /prefetch:83⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3812 /prefetch:83⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3620 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,15229807620471823561,15937834783002517617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1888 /prefetch:83⤵PID:5776
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/emre.turgut.315212⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffea0a46f8,0x7fffea0a4708,0x7fffea0a47183⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17509794732577584237,6073214748828972934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17509794732577584237,6073214748828972934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize471B
MD580a0b5026385c3e3df582df9fc8fec9b
SHA1fb2dbcb443777c8f3a649b3662e3a1e518f63616
SHA2567ba78f8c7a24dbe5e7e4b1be898c14e872a3bef211f4700da3671818d1670b50
SHA512b4945af394a04f4b0d9d9c65b39da704605438fa7fe6728b2a2e1f9f7a5712e358858512b2be6787f373bf80f9991ff2849c8d3a03ac28956efe7e7147df0a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
Filesize446B
MD54a6fe7318dc0c52648bb9e1ea10df975
SHA1414618c445eb82abaed32f8fe6884a7b3f5e10a6
SHA25680d9a5f1329776119dc9a23b1bdff981e003b516cb83caa67afe4c4fea3a0b86
SHA512bca86837adb20432c39b954265ac9621123d048cc7651f2ddf2f0f972bae4c8fef272cbedf71f0ef122d81252067cb6f805eff2ce13774c4c91f0536baa04eb6
-
Filesize
152B
MD51dde831b3f72227121241cfbcf0b8bfa
SHA1e076ca61127cce19e3495b3a0ae3dfdb8592effd
SHA256b3f388e535f4220252e0b0b4fc8146c51489ecbeca74227f8cdff78ed0062cc6
SHA5122ec5a389bb710a725b75ba3e27f3fbcb0d5d6bd2ff0803d1f2381d1a79c7162581c6818afaa7e10aa03900482e2a1f683ca8cb7ed2f68489efa093715740f03b
-
Filesize
152B
MD51dde831b3f72227121241cfbcf0b8bfa
SHA1e076ca61127cce19e3495b3a0ae3dfdb8592effd
SHA256b3f388e535f4220252e0b0b4fc8146c51489ecbeca74227f8cdff78ed0062cc6
SHA5122ec5a389bb710a725b75ba3e27f3fbcb0d5d6bd2ff0803d1f2381d1a79c7162581c6818afaa7e10aa03900482e2a1f683ca8cb7ed2f68489efa093715740f03b
-
Filesize
152B
MD51dde831b3f72227121241cfbcf0b8bfa
SHA1e076ca61127cce19e3495b3a0ae3dfdb8592effd
SHA256b3f388e535f4220252e0b0b4fc8146c51489ecbeca74227f8cdff78ed0062cc6
SHA5122ec5a389bb710a725b75ba3e27f3fbcb0d5d6bd2ff0803d1f2381d1a79c7162581c6818afaa7e10aa03900482e2a1f683ca8cb7ed2f68489efa093715740f03b
-
Filesize
152B
MD51aa7e0f203b5b0b2f753567d77fbe2d9
SHA1443937fd906e3a356a6689181b29a9e849f54209
SHA25627f1577aa081b2222b6549e74de58ef60bf0a054c7b2a345366e6ebbf44fab8c
SHA512ce2fff1ddfab2e82f4e8ec6b3d04405f9fb2ad07dccfdde404411de9bbc66033610ad1689316173878be9758bb822612d4a931901e1ed4bbbd41199c2885debf
-
Filesize
2KB
MD52b8a8e314140ecaa3f3fff89083ac550
SHA11acb9a55f910ea280c8e0fe3872566442dac0d2d
SHA256b083f5e60f620374ddf399a03c9e61017c655dae5eff3b5bd563774b18d8e3c8
SHA51201eff72c486a723fa95ee6e473e90de42857e3988e8e6a9beac4cb1400fd6ce5c8a31acb85eb3ebfa6c9a609f9fc670b64dfc017e69e7da100f9e35ec8d7f200