Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:29
Behavioral task
behavioral1
Sample
804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe
Resource
win10v2004-20220812-en
General
-
Target
804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe
-
Size
47KB
-
MD5
a1a95a4c16a981430df2e509f09e7911
-
SHA1
63ad3f63566a6dea61fc6adda2c5dbed382e06af
-
SHA256
804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356
-
SHA512
de1da6dd2c7aa8199ea64bf81a37790a5991fcf719e9a6cebf0fe4b7dfe43cbf1d936882e1cb1809dcb7dfe18048bcce1f8f0b5309a443dec4882742578d6b89
-
SSDEEP
768:po5PFTmNCi5ONtoZC5pLT+5sYe6SX4/5bm1qJ1W6eNXkQJ6QRa2pnaWcX0cUA5:i5N6CAIF5pLCC6SS5m1qJ1WFN9nxatzR
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2416-132-0x0000000000400000-0x000000000043CF58-memory.dmp themida behavioral2/memory/2416-133-0x0000000000400000-0x000000000043CF58-memory.dmp themida behavioral2/memory/2416-136-0x0000000000400000-0x000000000043CF58-memory.dmp themida behavioral2/memory/2416-138-0x0000000000400000-0x000000000043CF58-memory.dmp themida -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\Sierra\\mplayer2.exe" 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\fe5f6cf1-4765-4c45-8881-a5e4d0a1442d.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221203053558.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Download 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 5116 msedge.exe 5116 msedge.exe 2316 msedge.exe 2316 msedge.exe 3908 identity_helper.exe 3908 identity_helper.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2316 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 80 PID 2416 wrote to memory of 2316 2416 804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe 80 PID 2316 wrote to memory of 4264 2316 msedge.exe 81 PID 2316 wrote to memory of 4264 2316 msedge.exe 81 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 1468 2316 msedge.exe 84 PID 2316 wrote to memory of 5116 2316 msedge.exe 85 PID 2316 wrote to memory of 5116 2316 msedge.exe 85 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87 PID 2316 wrote to memory of 2508 2316 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe"C:\Users\Admin\AppData\Local\Temp\804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.seutoba.com.br/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4fb446f8,0x7ffe4fb44708,0x7ffe4fb447183⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:83⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5060 /prefetch:83⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:13⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:13⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:13⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5516 /prefetch:83⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:13⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:83⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x200,0x22c,0x7ff68aba5460,0x7ff68aba5470,0x7ff68aba54804⤵PID:2416
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:13⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6648 /prefetch:83⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3648 /prefetch:83⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:13⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7136 /prefetch:83⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7024 /prefetch:83⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7056 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,12801642270482870237,2351244502832375487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5560 /prefetch:83⤵PID:1680
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144