Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 05:17
Behavioral task
behavioral1
Sample
861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe
Resource
win10v2004-20220812-en
General
-
Target
861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe
-
Size
162KB
-
MD5
ee58bc265be76ce9b1a9f4a3c0aed090
-
SHA1
0e3b0133110149978d687972d3a170e5e13614eb
-
SHA256
861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda
-
SHA512
2fbb91fb0e6e2332061a053ce5b9d8e9199a1d0c72fb49aedaa3c1220cef339a6ceba3a87a18fe6dabafc4b487f6e8f668b161d63a940b41da76f9b7cbe25414
-
SSDEEP
3072:+4Lg1PGfap8NujvHunP1aAm0s06Gw4XgOGi/iEKLv+ISTEuOsVq5HtnS5kAjUcj0:+QCGhNurHPRYW4wOD/iJLAE2VqrSXjUc
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2472-132-0x0000000000400000-0x0000000000475000-memory.dmp aspack_v212_v242 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\fbf7fa67-57c4-4846-9374-6e730a4a18dc.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220919091230.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1676 2472 WerFault.exe 81 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 3020 msedge.exe 3020 msedge.exe 1772 msedge.exe 1772 msedge.exe 2620 identity_helper.exe 2620 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4800 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4800 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1772 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 85 PID 2472 wrote to memory of 1772 2472 861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe 85 PID 1772 wrote to memory of 1028 1772 msedge.exe 86 PID 1772 wrote to memory of 1028 1772 msedge.exe 86 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 4660 1772 msedge.exe 89 PID 1772 wrote to memory of 3020 1772 msedge.exe 90 PID 1772 wrote to memory of 3020 1772 msedge.exe 90 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92 PID 1772 wrote to memory of 3532 1772 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe"C:\Users\Admin\AppData\Local\Temp\861d6fdf1cf5d5333d34a3797664644cbb967c455ac965710f0dc2610096dfda.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 3882⤵
- Program crash
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=FUoNq1zO0BM2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa4ae46f8,0x7ffaa4ae4708,0x7ffaa4ae47183⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:83⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4832 /prefetch:83⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:13⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:13⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4540 /prefetch:83⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:13⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:13⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6376 /prefetch:83⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6696 /prefetch:83⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3952 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff6193c5460,0x7ff6193c5470,0x7ff6193c54804⤵PID:2696
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6696 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,447380959232794842,9616610475656394469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4664 /prefetch:83⤵PID:3952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2472 -ip 24721⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x2981⤵
- Suspicious use of AdjustPrivilegeToken
PID:4800