Analysis
-
max time kernel
608s -
max time network
1738s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 17:42
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
MEMZ.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
MEMZ.exe
Resource
win10v2004-20230220-en
General
-
Target
MEMZ.exe
-
Size
12KB
-
MD5
a7bcf7ea8e9f3f36ebfb85b823e39d91
-
SHA1
761168201520c199dba68add3a607922d8d4a86e
-
SHA256
3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
-
SHA512
89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
SSDEEP
192:HMDLTxWDf/pl3cIEiwqZKBktLe3P+qf2jhP6B5b2yL3:H4IDH3cIqqvUWq+jhyT2yL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MEMZ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Drops file in System32 directory 2 IoCs
Processes:
mmc.exemmc.exedescription ioc process File opened for modification C:\Windows\System32\devmgmt.msc mmc.exe File opened for modification C:\Windows\System32\devmgmt.msc mmc.exe -
Drops file in Windows directory 64 IoCs
Processes:
mmc.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeTaskmgr.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\INF\c_fsvirtualization.PNF mmc.exe File created C:\Windows\INF\c_mcx.PNF mmc.exe File created C:\Windows\INF\ramdisk.PNF mmc.exe File created C:\Windows\INF\c_extension.PNF mmc.exe File created C:\Windows\INF\c_fsinfrastructure.PNF mmc.exe File created C:\Windows\INF\c_fssystemrecovery.PNF mmc.exe File created C:\Windows\INF\c_scmdisk.PNF mmc.exe File created C:\Windows\INF\ts_generic.PNF mmc.exe File created C:\Windows\INF\c_fsantivirus.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\INF\c_diskdrive.PNF mmc.exe File created C:\Windows\INF\rawsilo.PNF mmc.exe File created C:\Windows\INF\xusb22.PNF mmc.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\c_sslaccel.PNF mmc.exe File created C:\Windows\INF\wsdprint.PNF mmc.exe File created C:\Windows\INF\c_processor.PNF mmc.exe File created C:\Windows\INF\c_proximity.PNF mmc.exe File created C:\Windows\INF\c_fssystem.PNF mmc.exe File created C:\Windows\INF\c_fsquotamgmt.PNF mmc.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri Taskmgr.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\INF\digitalmediadevice.PNF mmc.exe File created C:\Windows\INF\c_linedisplay.PNF mmc.exe File created C:\Windows\INF\c_barcodescanner.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\c_fsencryption.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\c_monitor.PNF mmc.exe File created C:\Windows\INF\miradisp.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\c_swcomponent.PNF mmc.exe File created C:\Windows\INF\c_netdriver.PNF mmc.exe File created C:\Windows\INF\c_fscompression.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\c_scmvolume.PNF mmc.exe File created C:\Windows\INF\PerceptionSimulationSixDof.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\INF\c_magneticstripereader.PNF mmc.exe File created C:\Windows\INF\c_fsreplication.PNF mmc.exe File created C:\Windows\INF\c_fsactivitymonitor.PNF mmc.exe File created C:\Windows\INF\c_holographic.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\dc1-controller.PNF mmc.exe File created C:\Windows\INF\c_fsphysicalquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_volume.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\INF\c_cashdrawer.PNF mmc.exe File created C:\Windows\INF\c_fshsm.PNF mmc.exe File created C:\Windows\INF\c_firmware.PNF mmc.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 43 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
mmc.exemmc.exeTaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags mmc.exe -
Processes:
browser_broker.exebrowser_broker.exeMicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 47cb0d1f0a64d901 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 16d431360a64d901 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 3854233f0964d901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\NextPromptBuild = "15063" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d1c31d0f0a64d901 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = b2ac0c270964d901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe -
Runs regedit.exe 3 IoCs
Processes:
regedit.exeregedit.exeregedit.exepid process 9600 regedit.exe 4280 regedit.exe 7892 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 3660 MEMZ.exe 3660 MEMZ.exe 4324 MEMZ.exe 3572 MEMZ.exe 4324 MEMZ.exe 3572 MEMZ.exe 4132 MEMZ.exe 4132 MEMZ.exe 3644 MEMZ.exe 3644 MEMZ.exe 3660 MEMZ.exe 3660 MEMZ.exe 3572 MEMZ.exe 3572 MEMZ.exe 4324 MEMZ.exe 4324 MEMZ.exe 3644 MEMZ.exe 4132 MEMZ.exe 3644 MEMZ.exe 4132 MEMZ.exe 3572 MEMZ.exe 3572 MEMZ.exe 3660 MEMZ.exe 3660 MEMZ.exe 4132 MEMZ.exe 4132 MEMZ.exe 3644 MEMZ.exe 3644 MEMZ.exe 4324 MEMZ.exe 4324 MEMZ.exe 3660 MEMZ.exe 3660 MEMZ.exe 3572 MEMZ.exe 3572 MEMZ.exe 3644 MEMZ.exe 3644 MEMZ.exe 4324 MEMZ.exe 4324 MEMZ.exe 4132 MEMZ.exe 4132 MEMZ.exe 3572 MEMZ.exe 3660 MEMZ.exe 3572 MEMZ.exe 3660 MEMZ.exe 4324 MEMZ.exe 4324 MEMZ.exe 3644 MEMZ.exe 3644 MEMZ.exe 3660 MEMZ.exe 3660 MEMZ.exe 3572 MEMZ.exe 3572 MEMZ.exe 4132 MEMZ.exe 4132 MEMZ.exe 3644 MEMZ.exe 3644 MEMZ.exe 4324 MEMZ.exe 4324 MEMZ.exe 4132 MEMZ.exe 4132 MEMZ.exe 3572 MEMZ.exe 3572 MEMZ.exe 3660 MEMZ.exe 3660 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
regedit.exemmc.execontrol.exeMEMZ.exemmc.exepid process 4280 regedit.exe 5592 mmc.exe 5828 control.exe 3656 MEMZ.exe 2116 mmc.exe -
Suspicious behavior: MapViewOfSection 42 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 4944 MicrosoftEdgeCP.exe 4944 MicrosoftEdgeCP.exe 4072 MicrosoftEdgeCP.exe 4072 MicrosoftEdgeCP.exe 5064 MicrosoftEdgeCP.exe 5064 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
mmc.exepid process 5592 mmc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
Taskmgr.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeAUDIODG.EXEmmc.exemmc.exedescription pid process Token: SeDebugPrivilege 1904 Taskmgr.exe Token: SeSystemProfilePrivilege 1904 Taskmgr.exe Token: SeCreateGlobalPrivilege 1904 Taskmgr.exe Token: 33 1904 Taskmgr.exe Token: SeIncBasePriorityPrivilege 1904 Taskmgr.exe Token: SeDebugPrivilege 3740 MicrosoftEdge.exe Token: SeDebugPrivilege 3740 MicrosoftEdge.exe Token: SeDebugPrivilege 3740 MicrosoftEdge.exe Token: SeDebugPrivilege 3740 MicrosoftEdge.exe Token: SeDebugPrivilege 5024 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5024 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5024 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5024 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3740 MicrosoftEdge.exe Token: 33 2064 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2064 AUDIODG.EXE Token: 33 2116 mmc.exe Token: SeIncBasePriorityPrivilege 2116 mmc.exe Token: 33 2116 mmc.exe Token: SeIncBasePriorityPrivilege 2116 mmc.exe Token: 33 5592 mmc.exe Token: SeIncBasePriorityPrivilege 5592 mmc.exe Token: 33 5592 mmc.exe Token: SeIncBasePriorityPrivilege 5592 mmc.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
Processes:
Taskmgr.exepid process 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe -
Suspicious use of SendNotifyMessage 45 IoCs
Processes:
Taskmgr.exepid process 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe 1904 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
Processes:
MEMZ.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exewordpad.exemmc.exemmc.exemmc.exemmc.execontrol.exepid process 3656 MEMZ.exe 3740 MicrosoftEdge.exe 4944 MicrosoftEdgeCP.exe 4944 MicrosoftEdgeCP.exe 4092 MicrosoftEdge.exe 4072 MicrosoftEdgeCP.exe 4072 MicrosoftEdgeCP.exe 2384 MicrosoftEdge.exe 5064 MicrosoftEdgeCP.exe 5064 MicrosoftEdgeCP.exe 4548 MicrosoftEdge.exe 4640 MicrosoftEdgeCP.exe 4640 MicrosoftEdgeCP.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 4920 wordpad.exe 4920 wordpad.exe 4920 wordpad.exe 4920 wordpad.exe 4920 wordpad.exe 4920 wordpad.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 5112 mmc.exe 3656 MEMZ.exe 2116 mmc.exe 3656 MEMZ.exe 2116 mmc.exe 3656 MEMZ.exe 3656 MEMZ.exe 5572 mmc.exe 5592 mmc.exe 5592 mmc.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 5828 control.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe 3656 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process target process PID 2932 wrote to memory of 4324 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 4324 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 4324 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3644 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3644 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3644 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 4132 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 4132 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 4132 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3572 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3572 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3572 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3660 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3660 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3660 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3656 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3656 2932 MEMZ.exe MEMZ.exe PID 2932 wrote to memory of 3656 2932 MEMZ.exe MEMZ.exe PID 3656 wrote to memory of 984 3656 MEMZ.exe notepad.exe PID 3656 wrote to memory of 984 3656 MEMZ.exe notepad.exe PID 3656 wrote to memory of 984 3656 MEMZ.exe notepad.exe PID 3656 wrote to memory of 1904 3656 MEMZ.exe Taskmgr.exe PID 3656 wrote to memory of 1904 3656 MEMZ.exe Taskmgr.exe PID 3656 wrote to memory of 1904 3656 MEMZ.exe Taskmgr.exe PID 4944 wrote to memory of 1240 4944 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4944 wrote to memory of 1240 4944 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4944 wrote to memory of 1240 4944 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4944 wrote to memory of 1240 4944 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4944 wrote to memory of 1240 4944 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4944 wrote to memory of 1240 4944 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4072 wrote to memory of 3960 4072 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4072 wrote to memory of 3960 4072 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4072 wrote to memory of 3960 4072 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4072 wrote to memory of 3960 4072 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4072 wrote to memory of 3960 4072 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4072 wrote to memory of 3960 4072 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5064 wrote to memory of 5084 5064 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5064 wrote to memory of 5084 5064 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5064 wrote to memory of 5084 5064 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5064 wrote to memory of 5084 5064 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5064 wrote to memory of 5084 5064 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5064 wrote to memory of 5084 5064 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 4372 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 4372 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 4372 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 4372 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 4372 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 4372 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2384 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2384 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2384 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2384 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2384 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2384 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 3656 wrote to memory of 4280 3656 MEMZ.exe regedit.exe PID 3656 wrote to memory of 4280 3656 MEMZ.exe regedit.exe PID 3656 wrote to memory of 4280 3656 MEMZ.exe regedit.exe PID 4640 wrote to memory of 2192 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2192 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2192 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2192 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2192 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 2192 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4640 wrote to memory of 1056 4640 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
-
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"3⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- Runs regedit.exe
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\System32\mspaint.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"3⤵
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
-
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"3⤵
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e41⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD583d44102b76365f698b22c5baeb790d0
SHA1440a4a64c04e8486de0fa3c6b56b54b67bd48808
SHA2560a8020f6a1fdecde9cf6d196017e4462177e1637a3d8328416f0a77a8d41fa66
SHA512903fd7d73219020e354fae1b6a526e7777b8a72b35592df5a17bfb367da728a75f85b1d243b13fd8ef32081e8925ae13a190070eb456124c3f1a76508a002d5e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD54616ba745436bf8e64cb6c4b22d5188d
SHA166b1260e39b627f74c541f959ceb9797dda2bc1f
SHA256542745d1532047e1febf4e754b7d732b3756b9e55b7d248af15630419830713a
SHA5128badef9bb86fc9c5b0dbbb17ec97f33b05a2c6f5d6fa3dd7f14fb618f3abeffdc0ccbbbfe9864e9b169270359c84173e7809083cf716c4685d09f5762a45c9a8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD5aaa4b16675735ca9b1de55fab03822e7
SHA1b64e20f51204181d868cb4638911b05fc5dd8f76
SHA256712a0ede37427d0ca753efbaba84dfc765a3b63058241a58dbe06874b5e211aa
SHA512f47fc84ef79991fdb56731a06da696181033c30254681f8dc5290c5a7fe43ee393262b5c595926ac825bfde6fe9a51b22454a036752d362dcbc953597d07db29
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD556f3f6a638af3e13ade389b8ff5b6e1d
SHA115cb72a3572863dd290c7c9f52449204e1ac9d88
SHA25691ce6327f27d8a9cd894d5ed5b62d1ca8a9e2b76112b5af0bcef431c1d6cac4e
SHA512a953d3c4fe05870b423415a98b858f58474b2295ed2a5878dd52e2e7ed044ab3b90857693c40d8c43abb351fb71fe8bd72dae312dceee93e560af0ecca204137
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chkFilesize
8KB
MD55f69b1a91185e79a64344c225a07913a
SHA10ede79372885d77988e874fecadc49dfbfbd7049
SHA256f79c9e8c434a4b897275934cef8463eb458e7eab9aa5f6aa0d53da4257a26ed5
SHA5124c21893de9d5f27e78430e1423885f2975ece688c8e0f62c30b360c6b89a750d4e1100f2c69f15431aa569fab1ea8cab83353cfc3d4fe4c16c725e9107192af7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chkFilesize
8KB
MD54ae76749ec2d6ab1dcb3ea8dfe82c79c
SHA118a163a94770a80244a9b69f043a91d52da2502d
SHA256862061dc8d464f0c04faea65e705ee913f2bb35ff955075c505aa816f6d9ebc0
SHA512934c8ee8113d8cd02af126347a1e90b3ab0d18bdd6c09b7b6ae3a3224b9324c6c86adcf59c0f45b9e4e4fc15d9d2d70d365ef56907552c2b77aa3ed0394044c7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chkFilesize
8KB
MD5ea547f79c3c8f6efb8f45d5d29b8f5d2
SHA1684a0373e49fb23fcafe736bc30b4e1235e26f33
SHA2562ea34a161deb735388c45f170df89baadbaa80bc9522674c400247c06192ce22
SHA512a5c52b4166d4bcae61e2dfbb36e69cee2520a49c3dff076f1b592748a6b55376959394d832e1bcab85b1a679caafd6101672044850262e4789080b9df2d65ae2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbFilesize
2.0MB
MD5d249cec5ad3563b7bd45666c667514cd
SHA1ad807e6eb8b769602c4e42277b69f7e3b3b87d78
SHA256cc9d8e043f946f5c39500ab9f5bb2b5cb5ca98e471585216354c02d8b14c249a
SHA512fba531a094294cec0994aab28316127e067da0a2a037f9098779ab8e441f120df4cbf2914ad4a02bc148ae6e3ee69cfa9aa59d3e24a28fa30e28739934a90a10
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbFilesize
2.0MB
MD56d2d66c784d09e90678a37bc187d96e4
SHA1c3f6c64a4843bc6a14c114effa4aff8a1d9ad2d3
SHA2569a4883ab318e56a9db0e87d56b52e0dc6829d5f3d1db1d1020562ee791627bad
SHA5129e057901b329091c93db4e7fe3e8db607ca42174f4a839d9006857634c389adaf20ae3e3204648bf313da3fe6762562ccc9137568a3ccfbdb437e29c02cd0568
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbFilesize
2.0MB
MD55b353344e02a6fc2ea2776a2fddaedb7
SHA12f1fdd0bf7b907b9f694579138fa32fa61d1eb6a
SHA2562f0c10202b6f7541e981f2f438abc83c94d40422686f988ab249d5a02c6788ad
SHA512207cae4ea1db1b7416bdd89614585ff5712ebaa436a1b7d954f4472692f2a709c4cfbd284ae6701eb1f24e44d308798c177a1c5cf967f75e3126f95eb2f00dfb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmFilesize
16KB
MD517c87885ecff86d75c085d78b86b1030
SHA1b696f740c0ffb4b2a2c19a42416a2aa14e6dc9bc
SHA2569c7b02e2481204a57f982dd5c8e73b596dd5ee35ed466ef64b2eae403bbd15e8
SHA512f70a6e0c82c98a9ca43edc2b3ba9ac9a58d6ed8e941bf2fd437f7962bf61f6c65cc8c11642e5688a70a58ba8dd64bb35a28d1e33ad338ecee7c4b27dd272ff23
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmFilesize
16KB
MD51f9fce601707f3e1a5a6d726021ebf7b
SHA154eea3dff153a5afb17ae701939edd975d8ab71c
SHA256c184402bf2c9e4392f10aec6ecb15e8ca4d016f51ca8600513abff85495c810b
SHA5120b919438c6b846844b7f7c5e32da2b41dbeb66cc7e42ecc788b5452e6dc307a6f453cb0bd21ddec9abb198c13d271f9fc8ea22a67bbefc497aece9cb1148b826
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmFilesize
16KB
MD553429801e64c9f7c1888f41c8d745830
SHA1b9faaf44dcb8080758aa3185e5ff9510a54db7df
SHA25691c7a00e7bf4da7e946d5892434840851ea35a29b011617760d1a374dbeaad14
SHA51261efca5ac3970aba7c4ac572c885bba7c5b7cb7b7f56d534e5d56da924a0e48caa295b80d8a067a8eafbc18748d2cb05a92db62f6c9eedad013d0f7ccb7189bc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{D48214C5-F974-4197-ABED-AD4F778E85B7}.datFilesize
4KB
MD5108bc44dad428fe567b2cf114aee6dc7
SHA19c9da559ec8bdb426a537efcb30994c353522ac7
SHA25689de163cbbaa30171b9361f66a1603e9a52585fe28005a9b80058856fafb2c20
SHA512b7e10431e2e1a5cca0192afcda0170f6a2e73667b317fd92783190a04309223bd20278e0b1054c3ea9b048f3d401980ff004cfa5f203cfc3104287af8ad32340
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{D4D39A98-1340-424F-8066-02B55583E4FB}.datFilesize
5KB
MD5924801397abcd7f43c3a1c3187c29914
SHA13a48e770a141b3c38fdefff96450c9d43c9de116
SHA256081cd03414ae0f40e93e666d0fe23c8cda123e4258a60e5731becc1b27c11e50
SHA5127a355dfcb3704614f66bb523dce58e6f89f6c8e9d11d3224846ddd1eaeedb72bf76725aae4d1166fc93fdd0f6b8e8c69f8ea3fc270c2cd8704cc1889dc2980c7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{F154151C-1D1D-45D3-B32D-DE7A2B5B46B2}.datFilesize
5KB
MD5e4cbb6288840c6c784933b1dc10cfe21
SHA11004fffc7cbcf9bef09cfae1d2d40b2500f83758
SHA2561dca5bc854aa6de1a6d586d0fc64f7add57209cfb1377712903c0b1caae1787b
SHA51221a02bb1cda0d6d268dc98d6baab8ad9cab9783cb7715afb21d42f945ef631d77a86c0bc2d45ead420b418fc15a22af6f4bce1a444bd3a102a41b3bc6bb3c4cf
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{3B887360-0B78-4CC5-BB2D-61B802E9CCD3}.datFilesize
5KB
MD5d04d8d0a0b05db080cde9f3c2ad1c861
SHA1bd227c5206209f336a1ca19548f87d76d3b870cd
SHA25667f745b3700cedd0464f8d9f7c7e1c52a0531ae0584f399e481befe22848cc7e
SHA512e36ccec7aa1ac8e5b5f468261762250f337f35ac38f23a7ac07796ed1c075771d7c01dccdcce8812757b0d3fb74987fadbede6163be31231b59a994413c71a88
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{3CA6F0AA-5E39-4FF1-82CC-351E9943B5AC}.datFilesize
5KB
MD5892cf01a704bffbecf42aab3a44c4d94
SHA1f9673177fead725d4c761ea0796045b6d851bca5
SHA25647b4bf9b28e86a30e5f10a703da3f1a0d443371248d768761aabc871038098e3
SHA5121cc14fb070e85f30399dfcd3238a9f7d75086f8724564982bf65f5abe4f9392fcbb232180ad810274934ba2e5fac559f1e8e04b4fbc50470fc04813723c11ab1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{9506712B-45D1-426A-A94F-A8B59899DC38}.datFilesize
4KB
MD5c7aa9f92c46ad2aa2eaff52794f59f1c
SHA15a4580ea84f342f177213716e19d9e95306ee0c8
SHA256962d6273f261c7d251c0d211056ab145728d3114ad6653cff5c1cfd58af8fff0
SHA512f63ed47e588dd344e7c01e63039c261296d254af2f155a9f60cc984b3f78e43cbc900c85b8d9762a9abaf37bee34949294b661fabe3aa9679fa25cfbed04bc83
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{BD63624F-B981-48A8-BD71-870CBFB9B2D1}.datFilesize
6KB
MD5a5d51509aea77ad3df485465bab4f472
SHA103127bf4c6db013222ff9552d5463d2d2a151cbd
SHA256dc9801d0264d7e274df6ac5adecc10213fafe3b52c6af42948569ae5b6dda05b
SHA512d4a2c597df33bfcb6b93686a8661f19bbe1dffa33153512d29c90835ec714b4006b4358c811e3ad6ec5c2d4dc805f5c77a00d19b3557d7be856ec61f4b34a717
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
C:\Windows\INF\PerceptionSimulationSixDof.PNFFilesize
10KB
MD5eb9549e636817f454eb558396f83d9fb
SHA1db27c4fc1f5c386dcf35516a6f390462f9321b87
SHA25654db9d6c2a829bdb55415cc237a1061513949e0e62f5e03e327a66b0e472dda8
SHA5124f649dd0c23ba0f723e843a15ce798c979fd8db87596e19846fd44ef9600858ec5e9948642fbc87c1f3042568a06bac7809fa2fbe6d1f0efcd26f7338591e751
-
C:\Windows\INF\c_apo.PNFFilesize
6KB
MD57045d4f4471565cf389e0b094ddadca6
SHA19177442a9070a3fe1f6a7535c935a67583f2f296
SHA2567875368d5545d1fcfc107e263a0eb4cdbefe36dafea9bed24a649c01e58355c6
SHA51251df975c86c579f7db01741b5c825bad9e37bf9667e34825eda2eef47517a12a1cd7ff1ebf80c9a15577b02d548cc17f2ae302630937ddba232078a688e1640c
-
C:\Windows\INF\c_barcodescanner.PNFFilesize
3KB
MD5dad384ff2d58200ec1efaf15d9281eb6
SHA14400c99cf3372d5c6626383b7cb2e5a785ac6898
SHA256523b9cfd61ed9fb6570f647fa9b913d41f8d9cbb7ef5222e18f7f3e50f41260e
SHA512e303560d392cebdb4252566984c0fdd22850791ff831526ad13914d6c2502724d7e2a36f5b28ff870cee2389811ec6c7ea335c294ec5287b6a56a6bf0a084dc9
-
C:\Windows\INF\c_cashdrawer.PNFFilesize
3KB
MD5fa7bb5bf277e0eac5cea4e1d2f3fdbcf
SHA1dc164f3b210ef96a216f02af441d5fd8420a3541
SHA256b8b420798436d6a31e881be4ef88597cb87a68276f7e99c52d7a7178632fc6cf
SHA512bb504f6777325918deb01edda8605ca525acc028a1f610c124eeef7d1c2d89505b473b1e5da5e214c685b771149b97d5a5cb836b582b471cd1a95ae0d7c78ba2
-
C:\Windows\INF\c_diskdrive.PNFFilesize
6KB
MD57690f2ab99501a922c1fd12e767aed8c
SHA16e8dbb9fc4afc53a8e6e31cf1032a37bd3d5dab1
SHA2561b6ef43a54189d7ac845152df19c384aab26ab918dd8380fa0090a5301527bc7
SHA512b6af738ee2d08d1ad39f9cd4ffd83e6088a209c69792d74c0a4a5a7838f251ed1d89d4055ee8c38acb43c939921d85e434e90d43a1e3da891cd49d768834953a
-
C:\Windows\INF\c_fsactivitymonitor.PNFFilesize
4KB
MD57ec2249944f005e2087a124b1d9e2916
SHA142d2f34c3eb77df61b03c06f38af2a72ef41abe9
SHA25698e3e26d61923de26dabb974498fbf3fae919c36e431cbec12e860f8c7f3ba09
SHA512b70a427f4291a43ae6235da5dd63016fc2167774bf7576b413006ea371a05294926555f3c54ffdf9c300811bceba3511837d47d75aa5873b5af3705fa69c1d31
-
C:\Windows\INF\c_fsantivirus.PNFFilesize
4KB
MD543d013d1525b88e41c8315d6e29b088f
SHA1cbf19bc2638d9625d7089edf3258d1078c8f27d4
SHA256e006c0a3fa2df85ea61e00851f48140b2df6a7dede4b35672f33464422576d52
SHA5128e72b2c5d9abcf8c5a8a801e17708c806bda2e2f00c533d0e910c4e18c11c95da144768e338702143afcbc9492fefca88a050798de847a1fd90dedcd882a5909
-
C:\Windows\INF\c_fscfsmetadataserver.PNFFilesize
4KB
MD58c68e8a3a01d4a1fcf652f17df711ca0
SHA14a0b7c8fe6c920f541bbd7ec6ad97933be0c2f0f
SHA2564882070b9cbb6d0317d9fb88ae6614c456972293b57f317d82b961985df57108
SHA5126f3728de623c7289c4c62498f2e7344ec02b1c27b274f6cc79cfd24267182c7dbb5d9e3a2ecc08b30e5e3bf5be8952f8c6c73e7b35aea7a34b05295f5edba695
-
C:\Windows\INF\c_fscontentscreener.PNFFilesize
4KB
MD573789d7972148672ca33dd5548ff9c18
SHA1c235ce261125ebfb5e1eadda0898b2449ca4e4a8
SHA256a808c1137cb8a83c92dc1152e6849d21d9d35119f877f4d18d52eb38af11b634
SHA5127a742075c2b8b57102df7caaeee25e865d223ca9372b210aa89d7aaa306c7bd7910023c4f132321209c8e9867c4400b953e45d427313d1303560294ebd63c80d
-
C:\Windows\INF\c_fscontinuousbackup.PNFFilesize
4KB
MD5cc00e08055b113cd742610e3b2dacdf8
SHA1d72c953f9bc57a3d656399a4549a5e364c35475b
SHA2566e7a7adad8aca8dc287064230b123293a0b9de411d8802422e28fcc3321e9390
SHA512e13f034eb13e16b98619714c4e0f3df3401c7f6457494a41cd725762424c8da34aafbb780cc91d40afb1a3fc159256f4c307929b307d5e5b5e4628b783206874
-
C:\Windows\INF\c_fscopyprotection.PNFFilesize
4KB
MD574dc1f459a6789cf93b4b56fd08f5919
SHA15223a96023c4ca4919d76cf8504c8a65e395583f
SHA256c331fd48e5de404e376bd60a4587dffde50dcdf63d366d905a403ff71b2311d8
SHA512e79038a5b434d3464a364b817099b9827142eb60e2e4533dfc80b73e9b6c4f6c60ecb3b231f492b36c189fa2e8e16cafd76d819bf8efda69c7a36785c706f3e5
-
C:\Windows\INF\c_fsencryption.PNFFilesize
4KB
MD5fd77a5a5eb36f0601b86261a8593a5b3
SHA14cf60bfc39bb2e1a486d350a015d1321245fab23
SHA2564c84ef4dbd756ebc988f1c5d9d9c837b164a7154dcc7d6c77e7e58069909dedd
SHA51239bdacfcf2ad7c01a1f22ceb02637a7385229c476079f7d6a55348ae7da344f7efde401f4af745f6915e9202c6efbf900768732236b5c2f6833be79af9f41503
-
C:\Windows\INF\c_fshsm.PNFFilesize
4KB
MD53aeaf7055006e15a694415f799b7331c
SHA1e65e90e0e2c5a69cdd89b708ffd67030214e36d2
SHA2566f823797e3462717fe78dabbe3d22a6b9e30ebd2da5ffd90f9970239b944b1a0
SHA512122c893a0539848c8e7141430ded5c4dfd3941ae5065ffdd38aae22176b0e22e00a83e7b6fab0ef828b309dd0e03a415a9b6cbf56c12d5b0c016ec1c530ce222
-
C:\Windows\INF\c_fsphysicalquotamgmt.PNFFilesize
4KB
MD5eb01405a1f7a7a4ad769b49a66300356
SHA159787aa816568232e2d3cc19e7ee1abea6a6d74b
SHA25666d4b5dd90ff9bccb03dabf0f57a82f48c679dc66094163593acf93edafe62bc
SHA5126f31886d977919c78d38517482d0892b46e10d0eceaf5cdbfc0c4d73cc7adb3c85bbaf45c1de7372f4c94a69018b0fe19b213324ad478994971ebad770610e5a
-
C:\Windows\INF\c_fsquotamgmt.PNFFilesize
4KB
MD5e6e56c6e36265d25ef860698f539c164
SHA1ae3738479d5d333cddbdf3147b22bf5c1cbe0ddc
SHA256c58dcda06a810ea6796200ac9a5b53163bf8a6a8318988885af9e2c1e77163ee
SHA512aeac913fab595f71cd35c402815f1c7cf26615d8df19793faa74f2179aa4b3c50166a280d6a2ac56c0c9f35e69d19e1df40ea8019c29b1a1a7316a43ec0d572c
-
C:\Windows\INF\c_fsreplication.PNFFilesize
4KB
MD516409aa93b19ed26b3be1927d95085d6
SHA14324f13a7af7fc6b265c677d925ea1b756baf8d9
SHA2562b8f0034ebae8874c87736d222aa2a83a12e330988d20a29eeaa8974c1fde0f1
SHA512be5d748d35f6cd8b277a31b607ecb827a6327d35397734d50c30470f1e18b589d185de677e59f71c65e4c0f4020102dfe12056e0ac7385c9f7c6cfedcd189731
-
C:\Windows\INF\c_fssecurityenhancer.PNFFilesize
4KB
MD5713da9509760b83b8836f5b8501f601f
SHA19d7dd41b9506c65246538484b0033a2d72e79a34
SHA2561253197cfd5b3771689f7f8ba574abade27abde70f3696e89b3d443ef74fd8e9
SHA5125a0739295b92390f98c40b4d39c5219056cbed2a493641680f2a15e05f05a0bc0bda2907b0ece1b9e2fa86c30732e8cb321fa9f425dc63333b6c4159cb481385
-
C:\Windows\INF\c_fssystem.PNFFilesize
4KB
MD53808a9c62348b04bcf9b6da6b7168466
SHA1453f5bf6127cda9c7bd9719a31d5c648afc6915a
SHA2563b4c3d6c10bc60d61252b656bd03ecc02309c5dfa711b2ac3655f6f2ccbfa734
SHA51299aceec8d076290976021539ffd750b3f27dfacd50e3192569c4cf1c113153cd02573123fb240c6e500599cb7cb71733b11b42e71f3e8c8fceba97bab8a0d8b1
-
C:\Windows\INF\c_fssystemrecovery.PNFFilesize
4KB
MD55756ca11d4f1bd01069d40f91ec2e99a
SHA1fcfe04dc2fd6a042ea8e5dec725b3476be180f03
SHA25691fdb41cdd8d952863a9fc7403a0a64b4a3244a9492eb4213084523b97b8ed22
SHA512cd295e21e91d269739e6720c3d9056d3bc1708491402b5672ed2e4e0904c4e15fe0958218e8e45f45d3dfc1341756bdb6606cc6d36c1354279256be8d8aa7c9d
-
C:\Windows\INF\c_holographic.PNFFilesize
5KB
MD5afe9130c4259b1327a15dc61b38f9bf9
SHA188a97dc9ffd9c1b2828dd76324bf928f8a28587b
SHA256ab6fe7d7591653f8b2fbc081016feecc64e345e1206d603a73991c857f2a7de5
SHA512d2e5e0d80a325d0de8fbd9e0f904376d3e6f5322809dc67ade6915190f2bdf766b71d9826e9b4d5eb31f25bde26ce063d1f8ba0bd6d136b57cb26544f04d8590
-
C:\Windows\INF\c_linedisplay.PNFFilesize
3KB
MD554c30731629fce5613cefbc4182e3ec0
SHA11f4b4aad14fbc75d2b45ee1a64ef4ce91d53fee8
SHA25608dafe01b152300cb65b794745d496f9681640b5bcfc46a294fb7de232e121d8
SHA512bcdedb678391b44a6e3b432e64999f2f53f4eff5a9e98d9384f7e45f5545ab9f5c866dad360875898d9bf1161793bd06266fbfdc60a3deef82c957c756e02cda
-
C:\Windows\INF\c_magneticstripereader.PNFFilesize
3KB
MD538c64da325bac139ec8a69c216678ae1
SHA1cbc76b3a3157c9508f3a694be7ae7806b1a9e44c
SHA2566ebfc152b89706dbce36bcf290a38b43111dc14b8eedb01d962ef04bdc98a1a3
SHA512a85e8e3a8a6b1583f0ebd7193ad3818a8c2f17659f2330acd99ba692b079b09fe68208a2676ff8237fca35f287134feaafa4c94dbb132c78cdb8fb31a5c9a19c
-
C:\Windows\INF\c_mcx.PNFFilesize
4KB
MD52d464f53b2d34a469c6756a8faf3b306
SHA177c038642a36beeddfa5b2159d0ba43430db5ebc
SHA2566fdefaea62b14f8599a605e5aa7c34d53a1a4df1c0f64c0a2f85a3228122520e
SHA512ad9433220a998cd748e9714ecc8efdcf26fcee42a7b035d7c22ee3ddc585d68c521c7cc340903ab04b50a1ae9958ad5b653d51e67cd774b74d763aae956f3a47
-
C:\Windows\INF\c_monitor.PNFFilesize
6KB
MD592063a4d766b8e16673410b752609af8
SHA1c3c92a36101e7d78a6aeba9c67e6b6965949be8e
SHA256dfade41d6c0b58b85023e8407ab138c6757dfbb2db56693b1c2036982b01a583
SHA512399c25379544e0e830c48e02a1097f9e9b39779b425543a5e9e399906dafb42ad3dec175c221d786d04d08a051f4ab7d2d532d8ffd32ff6b9dd7ce61f5440ded
-
C:\Windows\INF\c_netdriver.PNFFilesize
4KB
MD562089757dbfc383e26aaae58e1506ef9
SHA1507e9d217bd3a919225fead80e8e4ada545fe45b
SHA2566ee6f8c1547e9e417c730dbc6454d8441bfc564c6348f400547f882676775078
SHA512b4470d2d93174f1e1fa0cdd7b769479f06eacfbf1f9e1bfd7fe70db6c2463ac61be661556d52a054dfe113ebb607829197bdf74479981354e317f124de834824
-
C:\Windows\INF\c_processor.PNFFilesize
5KB
MD5a38afcd08c9a7032e18a6863bc2e62d9
SHA153e8e9a091dbb1f1d9e95f0af860f9955edfb971
SHA256fb83045d44632c910114a64722d9c527ef5edae519118897bb27598c85e97ea1
SHA512947ad9b0f381ab012bd18e684d8c17b9a9a804e2175e2429ab7fc32bebc95852fea16a0adce2f9027754e68e11b529b26f2e5b7804be259bb0fab6804f6cd32c
-
C:\Windows\INF\c_proximity.PNFFilesize
5KB
MD5000967925fe04ac7067ba748bc8ef9dc
SHA1b2251b7d7a9f8713968c8358a3015fb76c313328
SHA2568e8c36aed1ed76475c6d4f85c2de2d8079b467e8d68738dc127ecfbf451db58b
SHA512adefccaa13ef0db5dd5b6b15911640a17deb8e086948f6854bd1f60a2022bbba7c3be988eb4411d6240e8d72a9f32a8cd7978fe62a55a90f5bf00db7df6fb31e
-
C:\Windows\INF\c_receiptprinter.PNFFilesize
3KB
MD577751eea20f7b4280c0e466ba8180689
SHA1b3bcc97e858125d7f59b05090bd579a29e197fe8
SHA2567abeb2186ebf1028cd01893ecc85251d20394e10d592d30461866aacbd7a1204
SHA5122600d42f69d91edd109cb5f2b22d4c9b142790a8f6258fdc443e749ecb9edd7d65dd5d3abf25dcb522e8e3dcfc7a35faa16930f77300b2d7be99cca177e0f5a7
-
C:\Windows\INF\c_scmdisk.PNFFilesize
6KB
MD52693258e0e4fb4753a2616437160e6a9
SHA107ac5c652cc304b51522b83b84aa7d7a154a1719
SHA25665784d3ad3e7ee2dce8b8863d2e1c0b869a7c00da1f856d3bd764e7b6ccbc33b
SHA512c91a7afb295d0c21f40febe8cc885d9bcc3508b9e82b8ccf8d2fe57e79954a50fe8c208c352bc4ff0edbe2fefa97aa1302bca8d0602aae57e819489cf2e3d6ec
-
C:\Windows\INF\c_scmvolume.PNFFilesize
4KB
MD5c85351caf5e302bf12f55e3bd4b3f424
SHA19186c2714e342b5fb73439e1940dc95252802ef4
SHA256f185e356f42c8b2eadbef0f27c8ec656c4b44a1f072ac6cda82e80ce46ad092b
SHA5121ec4c910dd0630d923d837a6e05cb1617b1dcc23f011cdc6e671b1735a83da1bb6d3934e23ca6e07cc39f0e97084473f83be7860c4bd6d9f70a15e4fad5335c5
-
C:\Windows\INF\c_sslaccel.PNFFilesize
4KB
MD566719c5fc21c8cc4d0025a4f3566fdb2
SHA1dc2abe8ebf96f5a8ccf4c2277db40a2646f81a95
SHA256b666e4b3449292789c1e4536b4fa278cbc936930fd3f900116aa109cdd1749f0
SHA512424f6b6fe0272963baec12c3abd10ac763f5e5475137cf04d9a50dc6ef3a18ad870e0476a5ada73b8cd36a84823fde2345649ceadbddae4a75908481f8608942
-
C:\Windows\INF\c_swcomponent.PNFFilesize
6KB
MD5f71e2d237a8b312cf0ab8537f9225dee
SHA1b272f266d1a50611bd9b718e082b340226bdd403
SHA256539761a0bae0f23da9ae10a1ccaeb5e41484ec17ac47432f5c0ea0f1c6912d18
SHA5123e988d300598deca96251fa8e16e02fc0ce4a0f013849f2d505e41eed2d2f0ff991673b4b6758a92e85253b134d230da89997562ea3dfd6d2741e7af24e3e641
-
C:\Windows\INF\c_volume.PNFFilesize
4KB
MD59928873d826d3c2b28fc34de6a8d258b
SHA1004ce000c9a45c754b4b8683d04bad69399ede12
SHA2567a0b2d514fc79377984e382dbb0069891895d6c6410625c4978ab3cfcd094ff3
SHA5124ab53c58c0a7db9ed96f8483012b2f7cdfb9647d7ff10eb5eade9c54bf8ffc4013e35fc141b6f84d2d02a06d476591f8dc6fb2f31f8dd54c8d944fd8228cdef0
-
C:\Windows\INF\dc1-controller.PNFFilesize
12KB
MD530a921d866c4e9ae3f6dde21bf6f56df
SHA1507f70414e08fbf722c3a3f61eda6912a01c1067
SHA256ccf78b01afce742c1da773f34ab6b5e3fa71ae3435cb3c5d7124b6ef930c4757
SHA5128daddd6422c89a22be521a9114d43153d3b8ee3380407aaebaff25d36aec8d05866194e6ca0d4d8f569bb097ce081d63506839cb791ee745619a9306ada9be46
-
C:\Windows\INF\digitalmediadevice.PNFFilesize
7KB
MD5723041e98ab994d02f9ed4a64e254693
SHA1dd9609a5bd8847390d72040084ccc51d208bb915
SHA256d4516a9157b66532fbe83d515ccef2d27d8219b9462572b97fe806dde5c64124
SHA51297c8ebd84a4b556743587732949adfb1dc479405c041e474ed0449b31a84b3861f5d765e10673540c4c13f9ceebbc08b4abef6a64245d9f1757a63aa0fd738ed
-
C:\Windows\INF\miradisp.PNFFilesize
11KB
MD5ae1d3706604fd6a7b1568384264e0f59
SHA10f4f234b96aaa9e1af6273b02d5863917fbcc866
SHA2563ae415e0accd77769d3f7abd60f7a21926d8971c03bc9808a6da48a0713ec42a
SHA512dceef0ba189305909c7ea13c25ebbf5f2473477712ad686b829a6e392d00e3d34de2bc4be518dc3f0f76e7c8d7cbcc04fd43ff03dfd7aef9f18c42a4644200da
-
C:\Windows\INF\oposdrv.PNFFilesize
8KB
MD569b40267d1734d8ebd749f6722b3a3d6
SHA12359702f524b968ceaccf9fd722a1b63eebde29b
SHA2561fe414821d6219f860ee7e03a28f5f56774ccaefd937777f817ba3084be88665
SHA51201b10ca983a8a973ab467c7b72bef49950157b3907b6421d7362d6aaf69bd5f32afd528f99127f1537c940dca7a0b0a70291df04062c0337cc0d632f83b07565
-
C:\Windows\INF\ramdisk.PNFFilesize
9KB
MD59109be86f08db34f77df14a7b233caa3
SHA1a3213c29a5b7d59458b55e1ba97d261b0814b89f
SHA256797362e927ab4e3380229e928df2d442b5a5d176f7bed1e3a1e486386055b688
SHA5126df29e801522448e3405e4e207dcd82a9f015918f0fceb00c64c15f067b3a3c2135871b57a5070c2a22580a75c2fcc5e0353f2ac03e8c0b8498129315c07b5cb
-
C:\Windows\INF\rawsilo.PNFFilesize
8KB
MD589ff06628d0a0ea8c129c1c9e33bbac6
SHA1cdf8123effd7a5e9cbfffb787699fdd16ad30c77
SHA25604f94a29562852271b7e7c8342aa2b871d2b1fead7c01f730917fd0085f531fd
SHA51286d0ee4bace69482e590f2c520ae25ddbe16f6954ff4bf0fef5398cfca703e324a53a81d8bfc0619101649b3d3a4eaa61a6606283cf98a4f58872d847ff2f3b1
-
C:\Windows\INF\remoteposdrv.PNFFilesize
8KB
MD5fd94ea0df55ce1e67befce9a853f27d5
SHA11fc0cb4e2c1b6d1509ac7c227ebe21a974dd2e8a
SHA2560e91590f1fb41292d4a3e3fbd65d4bde8272e5105200d37d743124ac18fb7d55
SHA512bd5e4e24892bee1ce6acb41461c7aca8f15e71a32ba6492c8c19f369c18eec3a89b8303b438ebcbab7b7dfa4e58351727ecefe6b42b93b8c9874897dcc372715
-
C:\Windows\INF\ts_generic.PNFFilesize
8KB
MD50d71bd9c51d01c0cbfd5d3b14261365d
SHA19af27f1cff4dd3d3a3cad8fdee1ddfa901aa6bfa
SHA2565c9592713bacc9e17ffe2ee555d926b9e933c694dc08c1e281dcfc10d80f36b6
SHA512a4b02f85d73069ae8e840790a6bcd52127b541dfb7c673265eab41e4a95b50c87dc3cb4b6d6474732330981733b47e7997864a1d8d3b4d4dc9cb2e56045ba2ef
-
C:\Windows\INF\wsdprint.PNFFilesize
7KB
MD5d3396caf7f85aebc847a39944b55a5d2
SHA141c450c9bc408736a3a997a8b9934c5babab3696
SHA256eaed195e6fd7195161fe3b80fed286d525977c4c7291fb558d53b31f39edfed1
SHA512388a9ba8874ae6fa0d8b5b40dfff0fb358bb2a63b12f2004cf18ee94b2eb76c65fe11c2a72571d34639f2758b6c63335818f55ded063b0378205c9c7bcf29cd5
-
C:\note.txtFilesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
memory/1240-191-0x000001D858B60000-0x000001D858B62000-memory.dmpFilesize
8KB
-
memory/1240-181-0x000001D847CD0000-0x000001D847CD2000-memory.dmpFilesize
8KB
-
memory/1240-176-0x000001D847C60000-0x000001D847C62000-memory.dmpFilesize
8KB
-
memory/1240-189-0x000001D858B40000-0x000001D858B42000-memory.dmpFilesize
8KB
-
memory/1240-179-0x000001D847CB0000-0x000001D847CB2000-memory.dmpFilesize
8KB
-
memory/1240-187-0x000001D858B20000-0x000001D858B22000-memory.dmpFilesize
8KB
-
memory/3740-170-0x0000016800640000-0x0000016800642000-memory.dmpFilesize
8KB
-
memory/3740-169-0x00000168005E0000-0x00000168005E2000-memory.dmpFilesize
8KB
-
memory/3740-207-0x000001687A370000-0x000001687A371000-memory.dmpFilesize
4KB
-
memory/3740-203-0x0000016800500000-0x0000016800501000-memory.dmpFilesize
4KB
-
memory/3740-200-0x0000016800500000-0x0000016800502000-memory.dmpFilesize
8KB
-
memory/3740-167-0x000001687B630000-0x000001687B632000-memory.dmpFilesize
8KB
-
memory/3740-165-0x000001687A3E0000-0x000001687A3E1000-memory.dmpFilesize
4KB
-
memory/3740-146-0x000001687B800000-0x000001687B810000-memory.dmpFilesize
64KB
-
memory/3740-128-0x000001687B220000-0x000001687B230000-memory.dmpFilesize
64KB