Analysis
-
max time kernel
171s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 11:00
Static task
static1
Behavioral task
behavioral1
Sample
d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe
Resource
win10v2004-20220812-en
General
-
Target
d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe
-
Size
677KB
-
MD5
7a93a496ac8f9b3f3280405564663c7e
-
SHA1
09a36a9d479a450552bc20c31ef636a6077444ed
-
SHA256
d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b
-
SHA512
d0d47f857b63726c896c3cff41d279decf775d4906728fab51bd77cbe2389e814730757bcf4d44939dbfa7383f1dedfc9b6fed16ae464e99cb146bccab63b68a
-
SSDEEP
12288:S0M4b1fQBk4U4+grLIq0/Ke0MQ/9oMoraloeMM4WMT8QSFmyR/j:vMW0PHuF0MQVRqa1FQzs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1696 СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe -
resource yara_rule behavioral2/memory/1696-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-139-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-138-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-141-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-140-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-143-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-145-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-147-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-149-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-151-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-153-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-155-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-157-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-159-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-161-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-163-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-165-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-167-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-169-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-171-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-173-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-175-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-177-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-179-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-181-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1696-182-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 2256 d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\yxdown\IE.ico d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe File created C:\Program Files (x86)\yxdown\93.ico d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6ca0e43d-f3f9-45ff-bb94-332fddbda499.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221130180527.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2556 1696 WerFault.exe 79 1252 1696 WerFault.exe 79 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 2372 msedge.exe 2372 msedge.exe 4700 identity_helper.exe 4700 identity_helper.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1696 СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe 1696 СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe 1696 СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe 1696 СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe 1696 СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1696 2256 d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe 79 PID 2256 wrote to memory of 1696 2256 d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe 79 PID 2256 wrote to memory of 1696 2256 d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe 79 PID 2256 wrote to memory of 2372 2256 d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe 85 PID 2256 wrote to memory of 2372 2256 d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe 85 PID 2372 wrote to memory of 2004 2372 msedge.exe 86 PID 2372 wrote to memory of 2004 2372 msedge.exe 86 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4516 2372 msedge.exe 90 PID 2372 wrote to memory of 4836 2372 msedge.exe 91 PID 2372 wrote to memory of 4836 2372 msedge.exe 91 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92 PID 2372 wrote to memory of 4608 2372 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe"C:\Users\Admin\AppData\Local\Temp\d91e44e376167574a7a80c43c1b39b8fa621fee95c000672b683ed202f673f7b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe"C:\Users\Admin\AppData\Local\Temp\СÍûÔìÃÎÎ÷ÓÎ3ÐÞ¸ÄÆ÷Îå´úV3.0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 16003⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 16003⤵
- Program crash
PID:1252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.yxdown.com/ads/88.html2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa7b0a46f8,0x7ffa7b0a4708,0x7ffa7b0a47183⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:23⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:83⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 /prefetch:83⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5228 /prefetch:83⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:13⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:13⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:13⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:13⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6656 /prefetch:83⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x200,0x22c,0x7ff7cfc95460,0x7ff7cfc95470,0x7ff7cfc954804⤵PID:3892
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6656 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:13⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6404 /prefetch:83⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1934771964445591792,13441402294568513678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1696 -ip 16961⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1696 -ip 16961⤵PID:1176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a1bba35c752b36f575350cb7ddf238e4
SHA19603b691ae71d4fbc7a14dbb837bd97cecac8aab
SHA2560667863d71a3021ab844069b6dd0485f874bf638af478ab11c6fb8b7d6c834b6
SHA512eb5d3498dd994bec42a437cf91343665d3c35bfe3f6277a7393af6a0b8348772c3166d9be48955edddf6ef79fa508ec8d4f96d7d5df37ecdc52c90042e0a2967
-
Filesize
1.4MB
MD54d57bd691076f9cd20d7bbf174d5b18c
SHA1cefb925119687a4649ba81cc47a36416290e74a6
SHA256c35f0359667d7bf0b03e332c7a9fc0c235c410fe5b43e7d46b28fd1e30d7cece
SHA512a76be7652441fd1f2338ab4d871a36b7c3363990128c5142fb0c07387071d145b7a26ffeb4fd2b19c6cd1c7045ef4093b5f179f4a601bae12208b83502308fd9
-
Filesize
1.4MB
MD54d57bd691076f9cd20d7bbf174d5b18c
SHA1cefb925119687a4649ba81cc47a36416290e74a6
SHA256c35f0359667d7bf0b03e332c7a9fc0c235c410fe5b43e7d46b28fd1e30d7cece
SHA512a76be7652441fd1f2338ab4d871a36b7c3363990128c5142fb0c07387071d145b7a26ffeb4fd2b19c6cd1c7045ef4093b5f179f4a601bae12208b83502308fd9