Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
General
-
Target
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
fickerstealer
deniedfight.com:80
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/796-188-0x0000000001C10000-0x0000000001C5C000-memory.dmp Vidar behavioral1/memory/796-192-0x0000000000400000-0x0000000000450000-memory.dmp Vidar -
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral1/memory/4684-157-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/4684-158-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/4684-161-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3168 keygen-pr.exe 496 keygen-step-1.exe 752 keygen-step-3.exe 1004 keygen-step-4.exe 2824 key.exe 4004 Setup.exe 4508 multitimer.exe 1824 setups.exe 2896 askinstall20.exe 4652 setups.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 55 api.ipify.org 130 ipinfo.io 132 ipinfo.io -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 2056 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000cbc61a35633605d2a503af8fec47e6d8fb765278c7f5c7e37055695374a2ef007277cd8b68c4d1569d791b015586c8b548dc1dbd3a66e136aa23dfd559d747606ff957b270df9a326348062a0feade4c29217a0a9941ae4b727f MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4460 PING.EXE 4928 PING.EXE 5792 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 131 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 135 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4652 setups.tmp 4652 setups.tmp -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 4004 Setup.exe Token: SeCreateTokenPrivilege 2896 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2896 askinstall20.exe Token: SeLockMemoryPrivilege 2896 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2896 askinstall20.exe Token: SeMachineAccountPrivilege 2896 askinstall20.exe Token: SeTcbPrivilege 2896 askinstall20.exe Token: SeSecurityPrivilege 2896 askinstall20.exe Token: SeTakeOwnershipPrivilege 2896 askinstall20.exe Token: SeLoadDriverPrivilege 2896 askinstall20.exe Token: SeSystemProfilePrivilege 2896 askinstall20.exe Token: SeSystemtimePrivilege 2896 askinstall20.exe Token: SeProfSingleProcessPrivilege 2896 askinstall20.exe Token: SeIncBasePriorityPrivilege 2896 askinstall20.exe Token: SeCreatePagefilePrivilege 2896 askinstall20.exe Token: SeCreatePermanentPrivilege 2896 askinstall20.exe Token: SeBackupPrivilege 2896 askinstall20.exe Token: SeRestorePrivilege 2896 askinstall20.exe Token: SeShutdownPrivilege 2896 askinstall20.exe Token: SeDebugPrivilege 2896 askinstall20.exe Token: SeAuditPrivilege 2896 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2896 askinstall20.exe Token: SeChangeNotifyPrivilege 2896 askinstall20.exe Token: SeRemoteShutdownPrivilege 2896 askinstall20.exe Token: SeUndockPrivilege 2896 askinstall20.exe Token: SeSyncAgentPrivilege 2896 askinstall20.exe Token: SeEnableDelegationPrivilege 2896 askinstall20.exe Token: SeManageVolumePrivilege 2896 askinstall20.exe Token: SeImpersonatePrivilege 2896 askinstall20.exe Token: SeCreateGlobalPrivilege 2896 askinstall20.exe Token: 31 2896 askinstall20.exe Token: 32 2896 askinstall20.exe Token: 33 2896 askinstall20.exe Token: 34 2896 askinstall20.exe Token: 35 2896 askinstall20.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 4508 multitimer.exe Token: SeDebugPrivilege 4172 MicrosoftEdge.exe Token: SeDebugPrivilege 4172 MicrosoftEdge.exe Token: SeDebugPrivilege 4172 MicrosoftEdge.exe Token: SeDebugPrivilege 4172 MicrosoftEdge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1824 setups.exe 4652 setups.tmp 4172 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3756 4696 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 77 PID 4696 wrote to memory of 3756 4696 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 77 PID 4696 wrote to memory of 3756 4696 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 77 PID 3756 wrote to memory of 3168 3756 cmd.exe 80 PID 3756 wrote to memory of 3168 3756 cmd.exe 80 PID 3756 wrote to memory of 3168 3756 cmd.exe 80 PID 3756 wrote to memory of 496 3756 cmd.exe 81 PID 3756 wrote to memory of 496 3756 cmd.exe 81 PID 3756 wrote to memory of 496 3756 cmd.exe 81 PID 3756 wrote to memory of 752 3756 cmd.exe 82 PID 3756 wrote to memory of 752 3756 cmd.exe 82 PID 3756 wrote to memory of 752 3756 cmd.exe 82 PID 3756 wrote to memory of 1004 3756 cmd.exe 83 PID 3756 wrote to memory of 1004 3756 cmd.exe 83 PID 3756 wrote to memory of 1004 3756 cmd.exe 83 PID 3168 wrote to memory of 2824 3168 keygen-pr.exe 84 PID 3168 wrote to memory of 2824 3168 keygen-pr.exe 84 PID 3168 wrote to memory of 2824 3168 keygen-pr.exe 84 PID 1004 wrote to memory of 4004 1004 keygen-step-4.exe 85 PID 1004 wrote to memory of 4004 1004 keygen-step-4.exe 85 PID 752 wrote to memory of 4040 752 keygen-step-3.exe 86 PID 752 wrote to memory of 4040 752 keygen-step-3.exe 86 PID 752 wrote to memory of 4040 752 keygen-step-3.exe 86 PID 2824 wrote to memory of 3956 2824 key.exe 87 PID 2824 wrote to memory of 3956 2824 key.exe 87 PID 2824 wrote to memory of 3956 2824 key.exe 87 PID 4040 wrote to memory of 4460 4040 cmd.exe 89 PID 4040 wrote to memory of 4460 4040 cmd.exe 89 PID 4040 wrote to memory of 4460 4040 cmd.exe 89 PID 4004 wrote to memory of 4508 4004 Setup.exe 91 PID 4004 wrote to memory of 4508 4004 Setup.exe 91 PID 4004 wrote to memory of 1824 4004 Setup.exe 92 PID 4004 wrote to memory of 1824 4004 Setup.exe 92 PID 4004 wrote to memory of 1824 4004 Setup.exe 92 PID 1004 wrote to memory of 2896 1004 keygen-step-4.exe 93 PID 1004 wrote to memory of 2896 1004 keygen-step-4.exe 93 PID 1004 wrote to memory of 2896 1004 keygen-step-4.exe 93 PID 1824 wrote to memory of 4652 1824 setups.exe 94 PID 1824 wrote to memory of 4652 1824 setups.exe 94 PID 1824 wrote to memory of 4652 1824 setups.exe 94 PID 2896 wrote to memory of 4452 2896 askinstall20.exe 95 PID 2896 wrote to memory of 4452 2896 askinstall20.exe 95 PID 2896 wrote to memory of 4452 2896 askinstall20.exe 95 PID 4452 wrote to memory of 2056 4452 cmd.exe 97 PID 4452 wrote to memory of 2056 4452 cmd.exe 97 PID 4452 wrote to memory of 2056 4452 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:496
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe" 1 3.1617436086.60681db6bbd38 1016⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe" 2 3.1617436086.60681db6bbd387⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\qdworh1l1wj\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qdworh1l1wj\Setup3310.exe" /Verysilent /subid=5778⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\is-1AARR.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-1AARR.tmp\Setup3310.tmp" /SL5="$20314,138429,56832,C:\Users\Admin\AppData\Local\Temp\qdworh1l1wj\Setup3310.exe" /Verysilent /subid=5779⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\rdnmzyf5fba\vict.exe"C:\Users\Admin\AppData\Local\Temp\rdnmzyf5fba\vict.exe" /VERYSILENT /id=5358⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\is-PF1OI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-PF1OI.tmp\vict.tmp" /SL5="$70320,870426,780800,C:\Users\Admin\AppData\Local\Temp\rdnmzyf5fba\vict.exe" /VERYSILENT /id=5359⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\is-M85HO.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-M85HO.tmp\win1host.exe" 53510⤵PID:4308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\renkyejjtne\03f4ocgyy03.exe"C:\Users\Admin\AppData\Local\Temp\renkyejjtne\03f4ocgyy03.exe" /ustwo INSTALL8⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\rqtroxorax0\app.exe"C:\Users\Admin\AppData\Local\Temp\rqtroxorax0\app.exe" /8-238⤵PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\eor4vstoqmi\kx5xbl14fdr.exe"C:\Users\Admin\AppData\Local\Temp\eor4vstoqmi\kx5xbl14fdr.exe"8⤵PID:5708
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eor4vstoqmi\kx5xbl14fdr.exe"9⤵PID:2128
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gjwnpb0klj4\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\gjwnpb0klj4\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\is-396UQ.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-396UQ.tmp\IBInstaller_97039.tmp" /SL5="$4035E,14574851,721408,C:\Users\Admin\AppData\Local\Temp\gjwnpb0klj4\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5900
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-8GSBL.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:6100
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-8GSBL.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:1556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\so2sdkb24tv\y2nlglkxokc.exe"C:\Users\Admin\AppData\Local\Temp\so2sdkb24tv\y2nlglkxokc.exe" /quiet SILENT=1 AF=7568⤵PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\rx1ze05qlcw\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\rx1ze05qlcw\cpyrix.exe" /VERYSILENT8⤵PID:6048
-
-
C:\Users\Admin\AppData\Local\Temp\23jb1k0qlzl\vpn.exe"C:\Users\Admin\AppData\Local\Temp\23jb1k0qlzl\vpn.exe" /silent /subid=4828⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\is-Q77IR.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q77IR.tmp\vpn.tmp" /SL5="$3029A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\23jb1k0qlzl\vpn.exe" /silent /subid=4829⤵PID:6128
-
-
-
C:\Users\Admin\AppData\Local\Temp\yzzkj2rf0gk\jmuhpugujhr.exe"C:\Users\Admin\AppData\Local\Temp\yzzkj2rf0gk\jmuhpugujhr.exe" /VERYSILENT8⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\is-8UIIB.tmp\jmuhpugujhr.tmp"C:\Users\Admin\AppData\Local\Temp\is-8UIIB.tmp\jmuhpugujhr.tmp" /SL5="$40436,2592217,780800,C:\Users\Admin\AppData\Local\Temp\yzzkj2rf0gk\jmuhpugujhr.exe" /VERYSILENT9⤵PID:3400
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IT0NABSNGK\setups.exe"C:\Users\Admin\AppData\Local\Temp\IT0NABSNGK\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\is-56QO3.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-56QO3.tmp\setups.tmp" /SL5="$401A0,635399,250368,C:\Users\Admin\AppData\Local\Temp\IT0NABSNGK\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵PID:1328
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:2508
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:2556
-
C:\Users\Admin\AppData\Roaming\B740.tmp.exe"C:\Users\Admin\AppData\Roaming\B740.tmp.exe"5⤵PID:3996
-
C:\Users\Admin\AppData\Roaming\B740.tmp.exe"C:\Users\Admin\AppData\Roaming\B740.tmp.exe"6⤵PID:2100
-
-
-
C:\Users\Admin\AppData\Roaming\B898.tmp.exe"C:\Users\Admin\AppData\Roaming\B898.tmp.exe"5⤵PID:3796
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:196
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:4684
-
-
-
C:\Users\Admin\AppData\Roaming\BA01.tmp.exe"C:\Users\Admin\AppData\Roaming\BA01.tmp.exe"5⤵PID:4532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:2460
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:3888
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4172
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2012
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4828
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\145e37ed40c949b9b95db58ae047445e /t 3960 /p 39161⤵PID:5320