Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
191s -
max time network
244s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
LOL老干妈V3.7【无限视距】/LOL老干妈V3.7【无限视距】.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
LOL老干妈V3.7【无限视距】/LOL老干妈V3.7【无限视距】.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
LOL老干妈V3.7【无限视距】/点我购买.url
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
LOL老干妈V3.7【无限视距】/点我购买.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
LOL老干妈V3.7【无限视距】/老干妈破解补丁.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
LOL老干妈V3.7【无限视距】/老干妈破解补丁.exe
Resource
win10v2004-20220812-en
General
-
Target
LOL老干妈V3.7【无限视距】/LOL老干妈V3.7【无限视距】.exe
-
Size
2.1MB
-
MD5
2fbf4c7d09243e9fe22d38ff518bfbc3
-
SHA1
949764d5f2a084ee4a40a5350144219ff30a1c85
-
SHA256
f4a5dc939688a96b43d89cf3fa76c2ffaee928e6daa1185f29baeb1235c898ec
-
SHA512
862500c530de3b101d0a29bd91ef061e5a7642e11801cf0cfde2df41ffcdb3b4dfb4a6e4b581bfe2bb2a2cd8b5d7b7d685d59217e1bd2b9f63d762bd663cd3b4
-
SSDEEP
49152:WwgGGoPDhl3eiu495vdFCjjw/anzU2fkrWXe1wiRL+SNAZWIx6:Wk/ex0dFCnw/anjkG3iTAZWI0
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 LOL老干妈V3.7【无限视距】.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\3d14ef57-c50b-436f-92aa-4032f6de33b7.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221127202319.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS LOL老干妈V3.7【无限视距】.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer LOL老干妈V3.7【无限视距】.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?kfi1997" LOL老干妈V3.7【无限视距】.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kfi1997" LOL老干妈V3.7【无限视距】.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command LOL老干妈V3.7【无限视距】.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 852 msedge.exe 852 msedge.exe 3728 msedge.exe 3728 msedge.exe 4216 identity_helper.exe 4216 identity_helper.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4020 LOL老干妈V3.7【无限视距】.exe 4020 LOL老干妈V3.7【无限视距】.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 3728 4020 LOL老干妈V3.7【无限视距】.exe 80 PID 4020 wrote to memory of 3728 4020 LOL老干妈V3.7【无限视距】.exe 80 PID 3728 wrote to memory of 860 3728 msedge.exe 81 PID 3728 wrote to memory of 860 3728 msedge.exe 81 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 3504 3728 msedge.exe 84 PID 3728 wrote to memory of 852 3728 msedge.exe 85 PID 3728 wrote to memory of 852 3728 msedge.exe 85 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88 PID 3728 wrote to memory of 1360 3728 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\LOL老干妈V3.7【无限视距】\LOL老干妈V3.7【无限视距】.exe"C:\Users\Admin\AppData\Local\Temp\LOL老干妈V3.7【无限视距】\LOL老干妈V3.7【无限视距】.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.lollgm.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdf61a46f8,0x7ffdf61a4708,0x7ffdf61a47183⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:23⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3364 /prefetch:83⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:13⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:13⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5400 /prefetch:83⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:13⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:13⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:13⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:13⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6324 /prefetch:83⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6d09f5460,0x7ff6d09f5470,0x7ff6d09f54804⤵PID:3100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6324 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:13⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:13⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3332 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,10076449510530254034,8269936774858121823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5224 /prefetch:83⤵PID:176
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748