Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe
Resource
win10v2004-20220901-en
General
-
Target
c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe
-
Size
67KB
-
MD5
409ea944e54b81d80ea7f859c89a9682
-
SHA1
d30b01947275d5e89b1a35c2a2077b416e8522be
-
SHA256
c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2
-
SHA512
7709905143bb2e3349b80e62a2e0b8a08d9c97256061f21ee6852e6eb0d8df4bd2c5415ff649a3ce46fe9d2427f7692be5cfe742b1128855742c9c530dcf6976
-
SSDEEP
768:HTRF+gPaZbKyj9lFaGmx/gAmO1s04N/4aklbISfhaGDgVm75/dWWyXYrfGWDbX0t:HtNyMyhl5fAVs06/4a0k+H1lyIVDLTW
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\b2a5aad9-d4f0-41fe-87f7-2eeb0518b97c.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220919204113.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 4192 msedge.exe 4192 msedge.exe 4000 msedge.exe 4000 msedge.exe 5280 identity_helper.exe 5280 identity_helper.exe 5988 msedge.exe 5988 msedge.exe 5988 msedge.exe 5988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2996 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2996 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4000 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 83 PID 3356 wrote to memory of 4000 3356 c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe 83 PID 4000 wrote to memory of 3164 4000 msedge.exe 84 PID 4000 wrote to memory of 3164 4000 msedge.exe 84 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4380 4000 msedge.exe 86 PID 4000 wrote to memory of 4192 4000 msedge.exe 87 PID 4000 wrote to memory of 4192 4000 msedge.exe 87 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89 PID 4000 wrote to memory of 4388 4000 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe"C:\Users\Admin\AppData\Local\Temp\c140a8bc9bf918862c193280c09dcbdbc1daca0804266fed3f02e0eadab93fa2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=ZvizXaqutWM2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82e1446f8,0x7ff82e144708,0x7ff82e1447183⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:83⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:13⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:13⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5352 /prefetch:83⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:13⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:13⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5756 /prefetch:83⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6200 /prefetch:83⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:13⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:13⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:83⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3012 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff7b4ec5460,0x7ff7b4ec5470,0x7ff7b4ec54804⤵PID:3564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3524 /prefetch:83⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3196 /prefetch:83⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3192 /prefetch:83⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3180 /prefetch:83⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5272 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,15092070474586542903,6665829452388684417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3536 /prefetch:83⤵PID:5892
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x468 0x3cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996