Analysis
-
max time kernel
61s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 05:12
Static task
static1
Behavioral task
behavioral1
Sample
Test_Drive_Unlimited_2_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Test_Drive_Unlimited_2_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Test_Drive_Unlimited_2_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Test_Drive_Unlimited_2_keygen.exe
Resource
win10v20201028
General
-
Target
Test_Drive_Unlimited_2_keygen.exe
-
Size
5.2MB
-
MD5
a438d3b681e5250cad13ffbc5a8b1e5f
-
SHA1
e8106fabc033378b3644aa34b815147a77b83539
-
SHA256
297d988321fbbbadd950e60e649f2252049e4380b5824594113ea34c13a41410
-
SHA512
9727bbfc48c98c6caab97bf782122dd18e0cad567a1e7010a827086fc2db91abe85eb23e2cab7c538d9f7f2ffc3ee37463f3ed4c46b329800d76b8b650673c40
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral1/memory/5400-197-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral1/memory/5400-200-0x0000000002550000-0x0000000002E5A000-memory.dmp family_glupteba behavioral1/memory/5400-203-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral1/memory/5408-227-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/5408-228-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/5408-230-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 9 IoCs
pid Process 3428 keygen-pr.exe 1124 keygen-step-1.exe 3120 keygen-step-3.exe 2688 keygen-step-4.exe 2568 key.exe 2592 Setup.exe 2084 key.exe 2180 multitimer.exe 3200 setups.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 101 ipinfo.io 104 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 2084 2568 key.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4340 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3972 PING.EXE 6084 PING.EXE 5220 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 103 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 106 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 Setup.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3084 wrote to memory of 2408 3084 Test_Drive_Unlimited_2_keygen.exe 78 PID 3084 wrote to memory of 2408 3084 Test_Drive_Unlimited_2_keygen.exe 78 PID 3084 wrote to memory of 2408 3084 Test_Drive_Unlimited_2_keygen.exe 78 PID 2408 wrote to memory of 3428 2408 cmd.exe 81 PID 2408 wrote to memory of 3428 2408 cmd.exe 81 PID 2408 wrote to memory of 3428 2408 cmd.exe 81 PID 2408 wrote to memory of 1124 2408 cmd.exe 82 PID 2408 wrote to memory of 1124 2408 cmd.exe 82 PID 2408 wrote to memory of 1124 2408 cmd.exe 82 PID 2408 wrote to memory of 3120 2408 cmd.exe 83 PID 2408 wrote to memory of 3120 2408 cmd.exe 83 PID 2408 wrote to memory of 3120 2408 cmd.exe 83 PID 2408 wrote to memory of 2688 2408 cmd.exe 84 PID 2408 wrote to memory of 2688 2408 cmd.exe 84 PID 2408 wrote to memory of 2688 2408 cmd.exe 84 PID 3428 wrote to memory of 2568 3428 keygen-pr.exe 85 PID 3428 wrote to memory of 2568 3428 keygen-pr.exe 85 PID 3428 wrote to memory of 2568 3428 keygen-pr.exe 85 PID 2688 wrote to memory of 2592 2688 keygen-step-4.exe 86 PID 2688 wrote to memory of 2592 2688 keygen-step-4.exe 86 PID 3120 wrote to memory of 1056 3120 keygen-step-3.exe 87 PID 3120 wrote to memory of 1056 3120 keygen-step-3.exe 87 PID 3120 wrote to memory of 1056 3120 keygen-step-3.exe 87 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 2568 wrote to memory of 2084 2568 key.exe 89 PID 1056 wrote to memory of 3972 1056 cmd.exe 91 PID 1056 wrote to memory of 3972 1056 cmd.exe 91 PID 1056 wrote to memory of 3972 1056 cmd.exe 91 PID 2592 wrote to memory of 2180 2592 Setup.exe 92 PID 2592 wrote to memory of 2180 2592 Setup.exe 92 PID 2592 wrote to memory of 3200 2592 Setup.exe 93 PID 2592 wrote to memory of 3200 2592 Setup.exe 93 PID 2592 wrote to memory of 3200 2592 Setup.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Test_Drive_Unlimited_2_keygen.exe"C:\Users\Admin\AppData\Local\Temp\Test_Drive_Unlimited_2_keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\RNN67P0XAF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RNN67P0XAF\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\RNN67P0XAF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RNN67P0XAF\multitimer.exe" 1 3.1617513195.60694aebd4dbe 1016⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\RNN67P0XAF\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RNN67P0XAF\multitimer.exe" 2 3.1617513195.60694aebd4dbe7⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\wf2nnmu5abw\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\wf2nnmu5abw\Setup3310.exe" /Verysilent /subid=5778⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\is-MJ0MR.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-MJ0MR.tmp\Setup3310.tmp" /SL5="$40202,138429,56832,C:\Users\Admin\AppData\Local\Temp\wf2nnmu5abw\Setup3310.exe" /Verysilent /subid=5779⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\is-CVJ4M.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-CVJ4M.tmp\Setup.exe" /Verysilent10⤵PID:4808
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:5832
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:5092
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:5888
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\is-STVDL.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-STVDL.tmp\LabPicV3.tmp" /SL5="$203B0,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:5388
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:3936
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:2836
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:4716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\p1e4v3txdw5\o3cjz2q1hjo.exe"C:\Users\Admin\AppData\Local\Temp\p1e4v3txdw5\o3cjz2q1hjo.exe" /VERYSILENT8⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\is-T9DOT.tmp\o3cjz2q1hjo.tmp"C:\Users\Admin\AppData\Local\Temp\is-T9DOT.tmp\o3cjz2q1hjo.tmp" /SL5="$102E4,2592217,780800,C:\Users\Admin\AppData\Local\Temp\p1e4v3txdw5\o3cjz2q1hjo.exe" /VERYSILENT9⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\is-23S48.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-23S48.tmp\winlthsth.exe"10⤵PID:5360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\w3tlcefm0oi\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\w3tlcefm0oi\cpyrix.exe" /VERYSILENT8⤵PID:4972
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5124
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5524
-
-
-
C:\Users\Admin\AppData\Local\Temp\20rupe0n0qy\uakfjvkgyyl.exe"C:\Users\Admin\AppData\Local\Temp\20rupe0n0qy\uakfjvkgyyl.exe" /ustwo INSTALL8⤵PID:5152
-
-
C:\Users\Admin\AppData\Local\Temp\zbkws4phobc\vict.exe"C:\Users\Admin\AppData\Local\Temp\zbkws4phobc\vict.exe" /VERYSILENT /id=5358⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\is-8V3G8.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-8V3G8.tmp\vict.tmp" /SL5="$1035A,870426,780800,C:\Users\Admin\AppData\Local\Temp\zbkws4phobc\vict.exe" /VERYSILENT /id=5359⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\is-EQD8S.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-EQD8S.tmp\win1host.exe" 53510⤵PID:5276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\22uarbdhuuq\blgki4bgnao.exe"C:\Users\Admin\AppData\Local\Temp\22uarbdhuuq\blgki4bgnao.exe"8⤵PID:5260
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\22uarbdhuuq\blgki4bgnao.exe"9⤵PID:5852
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:6084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bwvrcguio1q\app.exe"C:\Users\Admin\AppData\Local\Temp\bwvrcguio1q\app.exe" /8-238⤵PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\wektabtttgj\1cmqszd3wqs.exe"C:\Users\Admin\AppData\Local\Temp\wektabtttgj\1cmqszd3wqs.exe" /quiet SILENT=1 AF=7568⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\sr3ftvw4bkj\vpn.exe"C:\Users\Admin\AppData\Local\Temp\sr3ftvw4bkj\vpn.exe" /silent /subid=4828⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\is-G818U.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-G818U.tmp\vpn.tmp" /SL5="$20426,15170975,270336,C:\Users\Admin\AppData\Local\Temp\sr3ftvw4bkj\vpn.exe" /silent /subid=4829⤵PID:5596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:5580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lgmrw0eutzp\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\lgmrw0eutzp\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\is-IAEG2.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-IAEG2.tmp\IBInstaller_97039.tmp" /SL5="$50404,14575144,721408,C:\Users\Admin\AppData\Local\Temp\lgmrw0eutzp\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5740
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-611NR.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5940
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-611NR.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:1012
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\OUPX4XZVAO\setups.exe"C:\Users\Admin\AppData\Local\Temp\OUPX4XZVAO\setups.exe" ll5⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\is-5NMVN.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-5NMVN.tmp\setups.tmp" /SL5="$8007C,635399,250368,C:\Users\Admin\AppData\Local\Temp\OUPX4XZVAO\setups.exe" ll6⤵PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:4052
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4236
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:4860
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4992
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:3864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:5016
-
C:\Users\Admin\AppData\Roaming\9197.tmp.exe"C:\Users\Admin\AppData\Roaming\9197.tmp.exe"5⤵PID:3124
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:6124
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5408
-
-
-
C:\Users\Admin\AppData\Roaming\9419.tmp.exe"C:\Users\Admin\AppData\Roaming\9419.tmp.exe"5⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:5904
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:6060
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4384
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4452
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4768
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4784
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4920
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7C49EF0857B167170583413366E61529 C2⤵PID:5044
-