Overview
overview
7Static
static
3Superfight...ll.exe
windows7-x64
7Superfight...ll.exe
windows10-2004-x64
7Superfight...10.exe
windows7-x64
7Superfight...10.exe
windows10-2004-x64
7Superfight...NA.msi
windows7-x64
6Superfight...NA.msi
windows10-2004-x64
6Superfight...10.exe
windows7-x64
1Superfight...10.exe
windows10-2004-x64
3Superfight...NA.dll
windows7-x64
1Superfight...NA.dll
windows10-2004-x64
1Superfight...FD.exe
windows7-x64
1Superfight...FD.exe
windows10-2004-x64
1Superfight...ol.exe
windows7-x64
1Superfight...ol.exe
windows10-2004-x64
1Superfight...d.html
windows7-x64
1Superfight...d.html
windows10-2004-x64
1Superfight...dup.js
windows7-x64
3Superfight...dup.js
windows10-2004-x64
3Superfight...t.html
windows7-x64
1Superfight...t.html
windows10-2004-x64
1Superfight...e.html
windows7-x64
1Superfight...e.html
windows10-2004-x64
1Superfight...r.html
windows7-x64
1Superfight...r.html
windows10-2004-x64
1Superfight...ior.js
windows7-x64
3Superfight...ior.js
windows10-2004-x64
3Superfight...e.html
windows7-x64
1Superfight...e.html
windows10-2004-x64
1Superfight...e.html
windows7-x64
1Superfight...e.html
windows10-2004-x64
1Superfight...nte.js
windows7-x64
3Superfight...nte.js
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-es -
resource tags
arch:x64arch:x86image:win10v2004-20240611-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
17/06/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/Archivo para MSVCR100.dll.exe
Resource
win7-20240611-es
Behavioral task
behavioral2
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/Archivo para MSVCR100.dll.exe
Resource
win10v2004-20240611-es
Behavioral task
behavioral3
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/Ejecutable DIRECTX-10.exe
Resource
win7-20231129-es
Behavioral task
behavioral4
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/Ejecutable DIRECTX-10.exe
Resource
win10v2004-20240508-es
Behavioral task
behavioral5
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/Ejecutable XNA.msi
Resource
win7-20240611-es
Behavioral task
behavioral6
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/Ejecutable XNA.msi
Resource
win10v2004-20240611-es
Behavioral task
behavioral7
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/por si acaso/Ejecutable DIRECTX10.exe
Resource
win7-20240508-es
Behavioral task
behavioral8
Sample
Superfighters Deluxe 1.3.7d/Por si te da errores/por si acaso/Ejecutable DIRECTX10.exe
Resource
win10v2004-20240611-es
Behavioral task
behavioral9
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Box2D.XNA.dll
Resource
win7-20240611-es
Behavioral task
behavioral10
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Box2D.XNA.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral11
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Cambiar el Nombre de SFD.exe
Resource
win7-20240221-es
Behavioral task
behavioral12
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Cambiar el Nombre de SFD.exe
Resource
win10v2004-20240611-es
Behavioral task
behavioral13
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/Language/Superfighters Deluxe Language Tool.exe
Resource
win7-20240611-es
Behavioral task
behavioral14
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/Language/Superfighters Deluxe Language Tool.exe
Resource
win10v2004-20240611-es
Behavioral task
behavioral15
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/annotated.html
Resource
win7-20240508-es
Behavioral task
behavioral16
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/annotated.html
Resource
win10v2004-20240508-es
Behavioral task
behavioral17
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/annotated_dup.js
Resource
win7-20240508-es
Behavioral task
behavioral18
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/annotated_dup.js
Resource
win10v2004-20240508-es
Behavioral task
behavioral19
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_base_object.html
Resource
win7-20240508-es
Behavioral task
behavioral20
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_base_object.html
Resource
win10v2004-20240611-es
Behavioral task
behavioral21
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.html
Resource
win7-20240611-es
Behavioral task
behavioral22
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.html
Resource
win10v2004-20240226-es
Behavioral task
behavioral23
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_bot_behavior.html
Resource
win7-20231129-es
Behavioral task
behavioral24
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_bot_behavior.html
Resource
win10v2004-20240611-es
Behavioral task
behavioral25
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_bot_behavior.js
Resource
win7-20240221-es
Behavioral task
behavioral26
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_bot_behavior.js
Resource
win10v2004-20240611-es
Behavioral task
behavioral27
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.html
Resource
win7-20240508-es
Behavioral task
behavioral28
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.html
Resource
win10v2004-20240508-es
Behavioral task
behavioral29
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.html
Resource
win7-20240508-es
Behavioral task
behavioral30
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.html
Resource
win10v2004-20240508-es
Behavioral task
behavioral31
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.js
Resource
win7-20240220-es
Behavioral task
behavioral32
Sample
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_inte.js
Resource
win10v2004-20240508-es
General
-
Target
Superfighters Deluxe 1.3.7d/SFD-1.3.7d/Content/Data/Misc/ScriptAPI/html/class_s_f_d_game_script_interface_1_1_base_object.html
-
Size
11KB
-
MD5
4a44777020df920c40dda59a5123c7d9
-
SHA1
be52474079d03f4ec05a07b021f904daa7e27ce9
-
SHA256
bb4286adedeb0f37c4a0daeb29805cb05135813e5b2423933bc6da46209f194f
-
SHA512
8213a48a6b1af7019eeccb68a77a88c6111a557bd1439c92b85d34c85d7decc4b81945b097e6d7d819cc4a9e66872bc8d0558b7caa2e5c4951368d2727ba8ae3
-
SSDEEP
96:te5ukD0e3u9bxiwn5ae/QgxpIkONtGQN8R++swYFOP5Z4cflhuKbnhutOuUqXA04:M5ukDlo9iwn5a4QHNMeCWuFEWZAnsD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3564 msedge.exe 3564 msedge.exe 3040 identity_helper.exe 3040 identity_helper.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4428 3564 msedge.exe 82 PID 3564 wrote to memory of 4428 3564 msedge.exe 82 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 1560 3564 msedge.exe 83 PID 3564 wrote to memory of 3332 3564 msedge.exe 84 PID 3564 wrote to memory of 3332 3564 msedge.exe 84 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85 PID 3564 wrote to memory of 4368 3564 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Superfighters Deluxe 1.3.7d\SFD-1.3.7d\Content\Data\Misc\ScriptAPI\html\class_s_f_d_game_script_interface_1_1_base_object.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa379f46f8,0x7ffa379f4708,0x7ffa379f47182⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,12361220372869296405,9116377736917102535,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD59132b8d018c06f3c20a7247b44de053b
SHA1d5c3d5569e5a62e18c825ff37a062fe91a0673df
SHA256e48f4171c518428ec4d92c7bde8c4b39aa7a9b0c5d87e044d58a1d86f4f9db4f
SHA5121ecb4bbac3dedd6706aaab8b75981383363bd61a0e354ddc9ce3bf2bd3cc6c462039cecdd5a7b47ae7ed0dffb2769ef794cd236a4d9c002b4a237e66a993fffd
-
Filesize
6KB
MD5982013f2b7c5256a1781a18851b20ec7
SHA136ac091b640120b8d79442698279299f5dc2d3bd
SHA25668f5e15d80901beeb17ccab5584fcc922ce1965579b9d9b7a79eafae812148e2
SHA512dcaf1bd205b87e1ad1209d26c1b5c0f3ce5291a60fac8a4cc0397d0666e4c45b0000c79458822136355b9dbc50d0ca66e36c2bd90caf641fb4f225a83001a8e3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58564cfb58b4c57fec390b2ed3194ba5d
SHA11888eebf3a3cae8c1c62b168133adc9583c4b4ea
SHA25644a08444a7e1058b25fd7a4737370df6fe5f874bd16d565eddb909ed82c21404
SHA51246be117fc0a9a275723822d0e73d5f686848bf7f14c887603e2299e5c18a028b36e7ed526fcd725afe0532a2bf2f92a3225bf87f237538c20a6e7994cc3cd27d