Analysis
-
max time kernel
169s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 13:42
Behavioral task
behavioral1
Sample
b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe
Resource
win10v2004-20220812-en
General
-
Target
b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe
-
Size
576KB
-
MD5
ac4a3a8b79c424676926c38020846680
-
SHA1
c5d5497c147324ca02fbf45145d4f51a864c0e79
-
SHA256
b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe
-
SHA512
689fe3125d05c3878fb2660354b690eb0967fdece8e47c5b3c2bef4e97a5b9d9b2508397c0658acf3801a03cf514a8f42eb7fdb821700b3fe28ff8dc17fbdcbc
-
SSDEEP
12288:hOFdX3IQB1K/EjYoieZ9gzb1fXFmwbjwJWFZBghSsQJ4Duc5CQuJweOt+Nb:Qj3I+K/9oDgzbNhjwJUL1SDqpi9+t
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3252-132-0x0000000000400000-0x000000000052C000-memory.dmp vmprotect behavioral2/memory/3252-133-0x0000000000400000-0x000000000052C000-memory.dmp vmprotect behavioral2/memory/3252-136-0x0000000000400000-0x000000000052C000-memory.dmp vmprotect behavioral2/memory/3252-139-0x0000000000400000-0x000000000052C000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 whatismyipaddress.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c4113fea-b800-4986-b258-b3b7e5ff40f6.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221211031019.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 1512 msedge.exe 1512 msedge.exe 2180 msedge.exe 2180 msedge.exe 4632 identity_helper.exe 4632 identity_helper.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe Token: SeDebugPrivilege 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe Token: SeDebugPrivilege 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2180 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 85 PID 3252 wrote to memory of 2180 3252 b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe 85 PID 2180 wrote to memory of 4484 2180 msedge.exe 86 PID 2180 wrote to memory of 4484 2180 msedge.exe 86 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 4016 2180 msedge.exe 87 PID 2180 wrote to memory of 1512 2180 msedge.exe 88 PID 2180 wrote to memory of 1512 2180 msedge.exe 88 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89 PID 2180 wrote to memory of 3660 2180 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe"C:\Users\Admin\AppData\Local\Temp\b5e205315aaee6ca03dc85340322b163d822a3cb8847b54c02b58d1a93ea17fe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.onehitcf.com/pop.html2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdf5c046f8,0x7ffdf5c04708,0x7ffdf5c047183⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:83⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4556 /prefetch:83⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:13⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:13⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5048 /prefetch:83⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:13⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3804 /prefetch:13⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:83⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6d4dc5460,0x7ff6d4dc5470,0x7ff6d4dc54804⤵PID:2888
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7132 /prefetch:83⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7132 /prefetch:83⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3472392178864501700,4731025613136717355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7160 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888