Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 01:32
Behavioral task
behavioral1
Sample
cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe
Resource
win10v2004-20220812-en
General
-
Target
cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe
-
Size
85KB
-
MD5
93dd4b3fc7cb9c8d41922e1b0276dd0f
-
SHA1
2e6df81c092a78777258b8204f1caa1944f1d1ed
-
SHA256
cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426
-
SHA512
e873ff278d36f0aff0c9ec4ecbc4fd744d7982c64e112e0a8e0eaaa6af466a7ab6bca857283655dd9a532b48b54f48afcd8c9a2607c0cb02cebaadf8cfbf7499
-
SSDEEP
1536:Yy8FOOcgKSiCZrYNMIzGqtYsvMqQqU18waPqhuRV7QQgDFHrDWPrc4BMNx/jMLy8:YHwC/IhLc1bhuRTmFWFI/IT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2796-134-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/2796-136-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\2a249194-dbb2-4eac-b245-85eed1a46c06.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220919041527.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Download cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 2756 msedge.exe 2756 msedge.exe 4868 msedge.exe 4868 msedge.exe 3968 identity_helper.exe 3968 identity_helper.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4432 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4432 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4868 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 82 PID 2796 wrote to memory of 4868 2796 cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe 82 PID 4868 wrote to memory of 4916 4868 msedge.exe 83 PID 4868 wrote to memory of 4916 4868 msedge.exe 83 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 4236 4868 msedge.exe 86 PID 4868 wrote to memory of 2756 4868 msedge.exe 87 PID 4868 wrote to memory of 2756 4868 msedge.exe 87 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88 PID 4868 wrote to memory of 1444 4868 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe"C:\Users\Admin\AppData\Local\Temp\cab461998c8e6a952c8f0f006464219302b72e9711f70bdaef2fd37dcebf2426.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=vsd3g0h_vs02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa44e46f8,0x7ffaa44e4708,0x7ffaa44e47183⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:23⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:83⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5008 /prefetch:83⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:13⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:13⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5212 /prefetch:83⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6284 /prefetch:83⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:13⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:13⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 /prefetch:83⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe8,0xec,0xe4,0xa8,0x104,0x7ff633f65460,0x7ff633f65470,0x7ff633f654804⤵PID:4740
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:83⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5420 /prefetch:83⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1828 /prefetch:83⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6944 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,1772572150139357841,7839040304898618590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:83⤵PID:3956
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x48c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4432