Analysis
-
max time kernel
178s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 07:39
Behavioral task
behavioral1
Sample
bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe
Resource
win10v2004-20220812-en
General
-
Target
bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe
-
Size
169KB
-
MD5
d6b45ad99779ef001a08d27b0b54b3ee
-
SHA1
8354ef2126d80a8199fe00ce4f6b4d1ac5798eff
-
SHA256
bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4
-
SHA512
7c83e227ead7a56e92ed1aa0410230c2573995b2dac5ecf7e7d0036d6452646f9398fd6756699933bf3d74de8888e25e7b5ecfb0ced9e99bb21f1adbfbda2ac6
-
SSDEEP
3072:MpzqLnxyFZmzEjagZ3VL8KbpYo7pxrLUr4si8vPWabeO9QiII6Rpl:MZaxyDmwx3+6pYobU28v+aF9d6Rp
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\776dbeae-9f0a-41cd-b7a3-b85b2ecf5f6f.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221207213130.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Download bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 228 msedge.exe 228 msedge.exe 4812 msedge.exe 4812 msedge.exe 5108 identity_helper.exe 5108 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1872 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1872 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4812 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 83 PID 2072 wrote to memory of 4812 2072 bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe 83 PID 4812 wrote to memory of 4728 4812 msedge.exe 84 PID 4812 wrote to memory of 4728 4812 msedge.exe 84 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 3896 4812 msedge.exe 87 PID 4812 wrote to memory of 228 4812 msedge.exe 88 PID 4812 wrote to memory of 228 4812 msedge.exe 88 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89 PID 4812 wrote to memory of 4244 4812 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe"C:\Users\Admin\AppData\Local\Temp\bb1d7e5864d6cf4efefdbc6c1c13644cbed7d38a2375e621a9a5a3b181919ee4.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=FvCdqOQZQuk2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7fff3acf46f8,0x7fff3acf4708,0x7fff3acf47183⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:23⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:83⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:13⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:13⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:13⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:13⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5716 /prefetch:83⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6284 /prefetch:83⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:13⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:13⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6664 /prefetch:83⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4720 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff68f585460,0x7ff68f585470,0x7ff68f5854804⤵PID:4760
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3220550023969459680,888790885092057692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6664 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2072 -ip 20721⤵PID:3060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x320 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872