Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe
Resource
win10v2004-20220901-en
General
-
Target
521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe
-
Size
60KB
-
MD5
0c7c3d3c79db81a5b7b3627087c1f910
-
SHA1
9892dc1a4923167cd26ea5c81202999253483a17
-
SHA256
521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad
-
SHA512
e971f92d2826f7a261d345307144ebe3b5fabfd8012b970d596aeb72e7118727cfd445d85251058a0234e8dfe215721ec852d3b49aa27f7bed28bbba2dde8529
-
SSDEEP
768:OknYgtFvqTOYqnow+F0gJCzA+gNVM2ow7ALNpOl247t6SjaP8myDjMuL/:OkoxWoTWA+n2f7kNKBtTW01L
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\2c69b172-1fc7-4961-ad1b-c7e42a58cbc8.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221107001918.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1996 msedge.exe 1996 msedge.exe 4468 msedge.exe 4468 msedge.exe 5088 identity_helper.exe 5088 identity_helper.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4468 4396 521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe 81 PID 4396 wrote to memory of 4468 4396 521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe 81 PID 4468 wrote to memory of 3428 4468 msedge.exe 82 PID 4468 wrote to memory of 3428 4468 msedge.exe 82 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 2920 4468 msedge.exe 84 PID 4468 wrote to memory of 1996 4468 msedge.exe 85 PID 4468 wrote to memory of 1996 4468 msedge.exe 85 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87 PID 4468 wrote to memory of 2948 4468 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe"C:\Users\Admin\AppData\Local\Temp\521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb871546f8,0x7ffb87154708,0x7ffb871547183⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:13⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:13⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5256 /prefetch:83⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:13⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5748 /prefetch:83⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:13⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:13⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:13⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:13⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:83⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff6125a5460,0x7ff6125a5470,0x7ff6125a54804⤵PID:3152
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5504 /prefetch:83⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3224 /prefetch:83⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:83⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1324 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6524 /prefetch:83⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3228 /prefetch:83⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,13157010087567988298,16022343509620719049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3144 /prefetch:83⤵PID:3780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=521868b77b203905af8bc9d9d6dd4f03cd355f4414354d2beed6f4c3e29931ad.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:1748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb871546f8,0x7ffb87154708,0x7ffb871547183⤵PID:4756
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51aa7e0f203b5b0b2f753567d77fbe2d9
SHA1443937fd906e3a356a6689181b29a9e849f54209
SHA25627f1577aa081b2222b6549e74de58ef60bf0a054c7b2a345366e6ebbf44fab8c
SHA512ce2fff1ddfab2e82f4e8ec6b3d04405f9fb2ad07dccfdde404411de9bbc66033610ad1689316173878be9758bb822612d4a931901e1ed4bbbd41199c2885debf