Overview
overview
10Static
static
10Malware-1-...30.exe
windows7-x64
10Malware-1-...30.exe
windows10-2004-x64
10Malware-1-...40.exe
windows7-x64
10Malware-1-...40.exe
windows10-2004-x64
10Malware-1-...32.exe
windows7-x64
10Malware-1-...32.exe
windows10-2004-x64
Malware-1-.../5.exe
windows7-x64
10Malware-1-.../5.exe
windows10-2004-x64
10Malware-1-...91.exe
windows7-x64
10Malware-1-...91.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows7-x64
7Malware-1-...ey.exe
windows10-2004-x64
7Malware-1-...ad.exe
windows7-x64
3Malware-1-...ad.exe
windows10-2004-x64
3Malware-1-...ti.exe
windows7-x64
5Malware-1-...ti.exe
windows10-2004-x64
5Malware-1-...an.bat
windows7-x64
7Malware-1-...an.bat
windows10-2004-x64
7Malware-1-...an.exe
windows7-x64
3Malware-1-...an.exe
windows10-2004-x64
7Malware-1-...ve.bat
windows7-x64
7Malware-1-...ve.bat
windows10-2004-x64
7Malware-1-...ve.exe
windows7-x64
6Malware-1-...ve.exe
windows10-2004-x64
7Malware-1-...ya.exe
windows7-x64
6Malware-1-...ya.exe
windows10-2004-x64
Malware-1-...re.exe
windows7-x64
10Malware-1-...re.exe
windows10-2004-x64
10Malware-1-...ry.exe
windows7-x64
10Malware-1-...ry.exe
windows10-2004-x64
10Malware-1-...ck.exe
windows7-x64
3Malware-1-...ck.exe
windows10-2004-x64
3Resubmissions
17-01-2025 20:14
250117-yz7h3s1qfw 1017-01-2025 20:12
250117-yy9l2sslcr 1017-01-2025 17:25
250117-vy9p9sxpez 1017-01-2025 17:21
250117-vw8eesyjfp 1017-01-2025 14:16
250117-rk9ass1rhk 1017-01-2025 14:12
250117-rhv1ds1lds 1016-01-2025 12:52
250116-p4et7a1mez 1016-01-2025 12:50
250116-p29xjssjep 10Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 17:25
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Malware-1-master/2530.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/2887140.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Malware-1-master/2887140.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/32.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Malware-1-master/32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Malware-1-master/5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/96591.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Malware-1-master/96591.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/Amadey.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Malware-1-master/Amadey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/Download.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Malware-1-master/Download.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/Illuminati.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Malware-1-master/Illuminati.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/Petya.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Malware-1-master/Petya.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/Software.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Malware-1-master/Software.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/WannaCry.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Malware-1-master/WannaCry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win10v2004-20241007-en
General
-
Target
Malware-1-master/MEMZ-Destructive.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation MEMZ-Destructive.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation MEMZ-Destructive.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ-Destructive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ-Destructive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ-Destructive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings calc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1632 MEMZ-Destructive.exe 1632 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 1632 MEMZ-Destructive.exe 1632 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 4704 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 3616 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 740 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe 1056 MEMZ-Destructive.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1096 mmc.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: 33 928 mmc.exe Token: SeIncBasePriorityPrivilege 928 mmc.exe Token: 33 928 mmc.exe Token: SeIncBasePriorityPrivilege 928 mmc.exe Token: 33 928 mmc.exe Token: SeIncBasePriorityPrivilege 928 mmc.exe Token: 33 1096 mmc.exe Token: SeIncBasePriorityPrivilege 1096 mmc.exe Token: 33 1096 mmc.exe Token: SeIncBasePriorityPrivilege 1096 mmc.exe Token: 33 1096 mmc.exe Token: SeIncBasePriorityPrivilege 1096 mmc.exe Token: 33 4020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4020 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1424 MEMZ-Destructive.exe 2544 OpenWith.exe 2256 mmc.exe 928 mmc.exe 928 mmc.exe 4388 mmc.exe 1096 mmc.exe 1096 mmc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3616 3332 MEMZ-Destructive.exe 90 PID 3332 wrote to memory of 3616 3332 MEMZ-Destructive.exe 90 PID 3332 wrote to memory of 3616 3332 MEMZ-Destructive.exe 90 PID 3332 wrote to memory of 1056 3332 MEMZ-Destructive.exe 91 PID 3332 wrote to memory of 1056 3332 MEMZ-Destructive.exe 91 PID 3332 wrote to memory of 1056 3332 MEMZ-Destructive.exe 91 PID 3332 wrote to memory of 740 3332 MEMZ-Destructive.exe 92 PID 3332 wrote to memory of 740 3332 MEMZ-Destructive.exe 92 PID 3332 wrote to memory of 740 3332 MEMZ-Destructive.exe 92 PID 3332 wrote to memory of 4704 3332 MEMZ-Destructive.exe 93 PID 3332 wrote to memory of 4704 3332 MEMZ-Destructive.exe 93 PID 3332 wrote to memory of 4704 3332 MEMZ-Destructive.exe 93 PID 3332 wrote to memory of 1632 3332 MEMZ-Destructive.exe 94 PID 3332 wrote to memory of 1632 3332 MEMZ-Destructive.exe 94 PID 3332 wrote to memory of 1632 3332 MEMZ-Destructive.exe 94 PID 3332 wrote to memory of 1424 3332 MEMZ-Destructive.exe 95 PID 3332 wrote to memory of 1424 3332 MEMZ-Destructive.exe 95 PID 3332 wrote to memory of 1424 3332 MEMZ-Destructive.exe 95 PID 1424 wrote to memory of 1460 1424 MEMZ-Destructive.exe 98 PID 1424 wrote to memory of 1460 1424 MEMZ-Destructive.exe 98 PID 1424 wrote to memory of 1460 1424 MEMZ-Destructive.exe 98 PID 1424 wrote to memory of 2004 1424 MEMZ-Destructive.exe 108 PID 1424 wrote to memory of 2004 1424 MEMZ-Destructive.exe 108 PID 1424 wrote to memory of 2004 1424 MEMZ-Destructive.exe 108 PID 1424 wrote to memory of 2256 1424 MEMZ-Destructive.exe 111 PID 1424 wrote to memory of 2256 1424 MEMZ-Destructive.exe 111 PID 1424 wrote to memory of 2256 1424 MEMZ-Destructive.exe 111 PID 2256 wrote to memory of 928 2256 mmc.exe 112 PID 2256 wrote to memory of 928 2256 mmc.exe 112 PID 1424 wrote to memory of 4388 1424 MEMZ-Destructive.exe 114 PID 1424 wrote to memory of 4388 1424 MEMZ-Destructive.exe 114 PID 1424 wrote to memory of 4388 1424 MEMZ-Destructive.exe 114 PID 4388 wrote to memory of 1096 4388 mmc.exe 115 PID 4388 wrote to memory of 1096 4388 mmc.exe 115 PID 1424 wrote to memory of 5056 1424 MEMZ-Destructive.exe 117 PID 1424 wrote to memory of 5056 1424 MEMZ-Destructive.exe 117 PID 5056 wrote to memory of 1868 5056 msedge.exe 118 PID 5056 wrote to memory of 1868 5056 msedge.exe 118 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119 PID 5056 wrote to memory of 1580 5056 msedge.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /main2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2004
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:928
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=best+way+to+kill+yourself3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9180046f8,0x7ff918004708,0x7ff9180047184⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:24⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:34⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:84⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:14⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:14⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:14⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:84⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:84⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:14⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:14⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:14⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:14⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:14⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,14227162902919473824,18005475450186116157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:14⤵PID:1012
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt3⤵PID:2148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9180046f8,0x7ff918004708,0x7ff9180047184⤵PID:4788
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5879cbe7bdc357c51648971e920bc9ca5
SHA18937ff120c0a564adfbba6a0070cae6ee2a77bb1
SHA25656d1c93c1a2db86c3c0f44f189e8cd54bf56560a11aac71add0bbb057b2f3a90
SHA512deaaef33770a1be0bc21b828e1ff6d4f750679a6bf3950916e4419052aea87017c42135db9cafdb830f8f2b041683bcad7630eb75f8eee83446ddad1f99f86b8
-
Filesize
5KB
MD5c151980590253f19fe5265c6ec023f4c
SHA1ed83b8e87cc1e6ac053ce29d16d50b8ee2bec303
SHA25688f71b447006c8d6640a84e5a81099b780a5741ba967ee8e5cebac39f3465bd7
SHA512cf7fd56e0b58152178b3f10504513121a32b767caee7575741cbcafd72eaa7bd9879615ac304fb685b23cd5f22c590b11fc4aa8a845d19e0653aba3321907733
-
Filesize
6KB
MD5a93e3f252a70df640ad115a2d2300bc6
SHA1c8d6336647f3a6093155dd3915c774d46863265d
SHA256904a921401bcaa628b5f8ec1b62fbd54c413c023036e6137d8268830526d2ca2
SHA51203c1d5064afedb10bbacff9113b77ad1227f959aaea3670aadd1fcb05b811883174a6cae8547e4b9b35b014b5cc41ab6ef3ff5295f65200c06cef569d958c35c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58a52eca0f85ddb829661de11afd62049
SHA1455da1bd1dc1c85e97a8b776fc718b2ce0503b38
SHA256dcdf57de58ab6c52c7c5d3a7a2d355702712a0a5e5a96510236d09e784ca5fc1
SHA51297402cc7e8c417d92bc1be571f0568f33b4b6918122c068a13e6b609fe566cc7f38ad9f9261f7421eda3ed243718b040c69e5c08b7cbb5ec7a42150dec88f8cd
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf