Analysis
-
max time kernel
177s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:13
Behavioral task
behavioral1
Sample
19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe
Resource
win10v2004-20220812-en
General
-
Target
19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe
-
Size
1.2MB
-
MD5
813d05905e8f7690614da3e6455d98f3
-
SHA1
a50fb2fa47191a51ba3ce374a1e30f4bc501a3e0
-
SHA256
19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718
-
SHA512
728a1cf3c8e135a41e4b5d52123042bfaeb1844c4bb02ad37dea25d1961b2ab650e8f55f5872953b63ede847e66cfd8935dc6a8939c7e28c95cc82afca0ba7c5
-
SSDEEP
24576:lQYfjS4ZnUXeVv79kFRaxknOHStGlDtjNXHYYUhAz0s/cLN7jjrQTq9v:NLSInmel79yRoiOHSklDVNX4z0Qt/jx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1748-132-0x0000000000400000-0x0000000000731000-memory.dmp vmprotect behavioral2/memory/1748-135-0x0000000000400000-0x0000000000731000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 216 msedge.exe 216 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 216 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 83 PID 1748 wrote to memory of 216 1748 19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe 83 PID 216 wrote to memory of 512 216 msedge.exe 84 PID 216 wrote to memory of 512 216 msedge.exe 84 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4404 216 msedge.exe 85 PID 216 wrote to memory of 4588 216 msedge.exe 86 PID 216 wrote to memory of 4588 216 msedge.exe 86 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88 PID 216 wrote to memory of 3168 216 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe"C:\Users\Admin\AppData\Local\Temp\19083cf8e78428077714cc6b6d8ed4bb363cbeb646a5f9437e454ed533ebe718.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cfmiao.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff815d446f8,0x7ff815d44708,0x7ff815d447183⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:33⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:83⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:13⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:13⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:13⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:13⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5948 /prefetch:83⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:13⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14395699236169067416,2890209359272339900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:13⤵PID:1496
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048