Analysis
-
max time kernel
366s -
max time network
368s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 14:30
Behavioral task
behavioral1
Sample
XENI_LOGGER.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
Creal.pyc
Resource
win10v2004-20230915-en
General
-
Target
Creal.pyc
-
Size
128KB
-
MD5
b975959ad3fa641900f85730108c8ee8
-
SHA1
8488731303e8fac8de90e00393dd842d1aa40238
-
SHA256
528f23dcc72c3570e335c3aa548b07cbedeb4d905822c45c4d64f74a76febfbc
-
SHA512
f91eccc54f002b02b128abdc9145e2f6f66fdfbfdbd49ce27cb3ff52ee759ca1c74ef87e09b1f65bdad766c8ab3cb82f6f84806ef6c8adcf16571078c2cd7927
-
SSDEEP
1536:LuPDrme3uzTZMB7aK1I3aqqj3CqHzdaYzT2zc9XqTmOwvnBYKjuGCjyqS:yPDqe3uz0BWKqBqVzCOOwv+/c
Malware Config
Signatures
-
An infostealer written in Python and packaged with PyInstaller. 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023263-252.dat crealstealer -
crealstealer
An infostealer written in Python and packaged with PyInstaller.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" NOTEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 56003100000000002f574035100057696e646f777300400009000400efbe874f77484957db732e000000000600000000010000000000000000000000000000007fa41301570069006e0064006f0077007300000016000000 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616193" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e8005398e082303024b98265d99428e115f0000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" NOTEPAD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1500 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 3092 msedge.exe 3092 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 2592 msedge.exe 2592 msedge.exe 4520 msedge.exe 4520 msedge.exe 4648 msedge.exe 4648 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4716 OpenWith.exe 4520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 1500 NOTEPAD.EXE 4520 msedge.exe 4648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 1500 4716 OpenWith.exe 96 PID 4716 wrote to memory of 1500 4716 OpenWith.exe 96 PID 3092 wrote to memory of 4956 3092 msedge.exe 103 PID 3092 wrote to memory of 4956 3092 msedge.exe 103 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4972 3092 msedge.exe 104 PID 3092 wrote to memory of 4332 3092 msedge.exe 105 PID 3092 wrote to memory of 4332 3092 msedge.exe 105 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106 PID 3092 wrote to memory of 4548 3092 msedge.exe 106
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Modifies registry class
PID:844
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Creal.pyc2⤵
- Modifies registry class
- Opens file in notepad (likely ransom note)
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbcc3f46f8,0x7ffbcc3f4708,0x7ffbcc3f47182⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3476 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3754911829822728806,5101016117676884044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:4120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f95638730ec51abd55794c140ca826c9
SHA177c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA5120eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
21KB
MD5cbea70b04b59a1062f558a6f074266f4
SHA17305d0ea018a0a41a52f7f468026447cda3de323
SHA2563fe2112060049e12fadd48c6648f5a6c817e12730c45c4638b92da6928b2a631
SHA512be78484eb5c3db930501cd294a94fea8d8d6623e78b430d3f9a82fb1553bda398e36f5915b005c51604c6d04d83524376001d3f4ff824d94b90ee06b12f4f2af
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
Filesize
69KB
MD57f64f527eb916de76d5559f2af78c4c5
SHA1a08d47d130d2025d8c678609fa857e4da5d34105
SHA25676c12bca3ea33b6d5d0c248b8a7935e467a3cd35257cae3829d16a3dc5abf891
SHA5126c706f7a5465a6bd002c004726e35719a1df7a8ce84d3ca620db22ae9016c4285cc344e8d080898fca2212b9c2e801e43951a55b46244e080086bf1dcedee56f
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
89KB
MD520b4214373f69aa87de9275e453f6b2d
SHA105d5a9980b96319015843eee1bd58c5e6673e0c2
SHA256aa3989bee002801f726b171dcc39c806371112d0cfd4b4d1d4ae91495a419820
SHA512c1e86e909473386b890d25d934de803f313a8d8572eb54984b97f3f9b2b88cbe2fb43a20f9c3361b53b040b3b61afb154b3ec99a60e35df8cf3563dabf335f54
-
Filesize
1006KB
MD5940b02fead1b7095a634fc3d521bc718
SHA172b533a2dba9cbda304f944eb5398e0ee2c6aa6c
SHA2564bd3e29dcfa1cc9e4d1b9c7b6e67daba75e7778b5e414e40e9b4d09b3fde1019
SHA5126750550bbd51f05653eb724d7e336c16b13def4564b42647d50875f4d440abf3ec82736de2ebe383beea30d1f0386f95175938abb1abe9503273f2a73c6f21b4
-
Filesize
96KB
MD5d1af002b1ef0a95ef467617f18c2f75e
SHA121df85c924281de7d66523b58862b2a91765f9d5
SHA256661ba893a18680188c86da0b5cd8682341aec2cc3a2765bdfb885acfa530ab96
SHA512c8057a3532f4837fdff2f60470b3c20013d74daf76cf6ed05bf9bc90e1d45b0e0093a04001c49a575e82df90991d91c6d06bbcfd41400e9d7f5b8188a2621bd9
-
Filesize
27KB
MD5fef8134e8958787b18018f3e59050b3c
SHA1e410997cbf7dcba7278129c87b0bafacc3044368
SHA256b6601c89f114673f193bea700f3b471ef3d3fcb583e40d18b3b5ed5af3a8e9cc
SHA512563c85dc21442e21a85a6f67a8f05bfc9db93d3ad4e61b6aedadb5888fe368e95cbac3f9ff2c4cc6e5343eddc30cc9bc3826e5f9ce9a87ca7c867d6704854ddf
-
Filesize
29KB
MD5d18c98bb03dac8dd996130d56f3d8e8c
SHA1cc1777baef75c9438534927036a21f22e91e5578
SHA25689a5585efd3c48a3870d383705937d51bb2a3a776eb01805a2629dd7a28e3c2e
SHA5120f44468b1d15250636238afecc774e558ee27270d45d12ed178bf50cc46f4a6cca101b72daf2b56acf9a066c9187274f8495fa1df097069b7c03f7dfa3b76f36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5226d40ce25fa08bb54439671ab3a93fa
SHA143cac43adc7da6a9b15ecb5c3f5d25dd389c7b68
SHA256f41ee40c44dd88fcc8198c429cda1028f1646f906d4cd2beca196599b1305cad
SHA5127de48daaf9685508e8267962fd57e2b7a535b34b0ce51aef8c14821632cedd8ebe2fe18dad64d81a460004e8bfa5c84d0bf50858da757d2ccc130b2b442e0667
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5eda71c8537b7d7222febe0409d500353
SHA1557588b85fced7c4a7e202f955f7643d3b55ec2c
SHA256407a0aeca947522f2196cc949eb48b0ba572d38b514e0e6b6862f50be8cdd225
SHA5122cd37fbbe526ccdca151bcdde3d86a331af8d0b3575d077663b8013c446177385f603ec30ddf522a8aad2f1ebe779b01157fa1fe3d1118c85165c70f3d8cffbb
-
Filesize
682B
MD5b53f70480a48444fe65c701cc1c7cc19
SHA1b991caed35888f24dbc190793e0b4a0a85d09abc
SHA25674f08a9a649fd9a6af782784bc8f596b83f1154c73593f83813373ce36086f7a
SHA51298e9fc3d0d3c973f735c186fc07ba970e168b97d6b7cc7d7df98dd4a2906fe9329bce4b5c6e263edf783da193029437ac4808b8c2a0c2cbbe18f21205d129df5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
613B
MD5d168710f3f89be709ce83f0f691bc3fd
SHA1f0bc507b908d5aa25bca3466797a6a9ca44e2c38
SHA256e32bdee48e15ca1fa0d57bd3e277ed9602a3fe1a9b34d0761e0a009121c795e7
SHA51207f3e04891b5ccd0ea6b2d4785e6e0aca5e96d8c75a627d951bdf40e473fe69ef8cdd9ac5c497e9760158bbbf3f44aca1de977d11fdc728b88a18d809562430b
-
Filesize
5KB
MD59a24230497e4715d7f30e72fcff375ef
SHA183456ca50f0d1dcac25186ac21d0d087088035f6
SHA256b72b4d3d38d3ce34590d515ab3b5e23c31a0ae014c61890c82dc46603f703a81
SHA512c9f8f6b0238e97bd0d2845ab0e84094f97b592e2f123aafe53676d06b67555caa4a3a0057dd174eefaa7ad630aa2085e1774a7852a69edfe73041dd607dc8ed9
-
Filesize
5KB
MD593c63f17f5206d1c456cd5d71450b4f9
SHA11829023fe308ce5524189523fd032aa9d03125c9
SHA256addc6288a84a96a5ef381baa571bd0d25bc882f14d09a5bf772fccbf1784daff
SHA5123b949dcbaa3f8dc3f010598aa886bc015a9135dbe29bf655c990f0908e571c352d3b1ea319c1b9baa4e8ed88d685750c3462c03678ee0e3b29f78fa437d967c4
-
Filesize
6KB
MD52f12cb6b719828e78f5a2ff0b9531cf4
SHA1e0a0c1956f3d81ca70468802e23f9122045c5a5a
SHA256b951dd0b691e0723d0908e9f9d1eab936ec03ec29703a8ce949d835c9d714633
SHA5122a36f1de28ad887f18ffadf4911635861d2c2210883958b08f4d462a5c9ab82f072aee30e468336346cb0d98fd143ba02dc592aff27b8e1cd86361abffba4359
-
Filesize
6KB
MD5fa868c32dcf8f9ec51cbf78e10d67cb9
SHA1da4fa902d9afac4941c3d1ea29f2125f848a0079
SHA256f5e08898dd28ff822ecdd9eabcc7d4132b8f9bfa292759f628333a40f7b9d19a
SHA51293ba77a0d818e1028b07ba833287dca5bb9c9b0665f6dde9a9caa55fda8ab97464ee01ac5a238d84c998190808329c7a048e944e16fb705884d06769d021b95a
-
Filesize
6KB
MD51ab7a065d2d270fee2e212e3d33f2607
SHA1d70851d1367702622d3a064178018f076b765d0e
SHA256d553f0280dce33f21050ffe2f29237f3dfc3d9d1ebdabf6d898c5c922a1e8c37
SHA512a990dcd08afb303f51180ad75b14181a821073cd166b376aa41a656bd95d28dd6f716b9b9643515ae193b19e7fb9cb3f215eea74e7c6ddb7dbbbb63d7a9705d6
-
Filesize
5KB
MD576e936ee6a46811ba2fee9f9e9278aa7
SHA1c3c163bff15df754c23ca4e9f62668c37be01f30
SHA25666043851ab9575d718f592ccc8b0481b0962a9c33719ac36672f8456e68bf45d
SHA51259274dcafb60b87e4413a0549cc32ea9c9fe860db7eef5ed336b72931c3e7094a821f114427a32f652830754ca0825ea85557bd031d50a049bb06fc8011d49aa
-
Filesize
6KB
MD5dad640fc521c2ab87c2592ef4298e4ba
SHA158f44988b1289704161fae061de422f956355711
SHA256e0a53761e0e42b657423c971dff886eb523165b0cd1f7b34b06f883554d17503
SHA512fc61186c217301f4d345f7db06d5ae41c1f79b8a1d50bc3b8d7705d4e1f175d93d5e887db4dfa56d6c59a023d4e12061a7d6d093e1bd2303240b7e8005176663
-
Filesize
6KB
MD5df53d9373bb557a176695f06775b0a38
SHA1ad99fc54b54315fd871d0a10eb7c227fd5ff91c6
SHA2568d3c2475d72535ff55461ccf8c4729f9b212f574507bb5ab565f43236853948b
SHA512071d03571e6618705e568861e5a962db6e36d7cd08f61a29b5c7793c2043fc0ab8e7d90b409df5881cfdfcbdd61162234f408b6a4eed8e8acf7f08e88270e40d
-
Filesize
24KB
MD54a078fb8a7c67594a6c2aa724e2ac684
SHA192bc5b49985c8588c60f6f85c50a516fae0332f4
SHA256c225fb924400745c1cd7b56fffaee71dce06613c91fbbb9aa247401ccb49e1ee
SHA512188270df5243186d00ca8cc457f8ab7f7b2cd6368d987c3673f9c8944a4be6687b30daf8715429bd1b335391118d0ce840e3cb919ff4138c6273b286fb57b2b6
-
Filesize
1KB
MD5361347dfa9d91fb031cf4812dd826eed
SHA1b4fc257a3129314931cc504f84d48a72046d70d6
SHA256ad8db4f0988e6361d1294a6813258eb794ae83da0d9e08653fc2f4b78c47214f
SHA512d21fc4a2e38c2f1e4f509e10659c98c180cbd429821b0cefa4bc1585a23d09ba79c2c01e3c1c056810117a6b803a7f3488b97a437568c53e89b54742cb092f48
-
Filesize
1KB
MD5b3d86d6f05e98c9af917bb4938a977d3
SHA11e695ca00eb2b20480d573bfb4facf3be7be21f7
SHA256320de8b2b4f3aa2601e830c98d963bfe038b0546a266f763944e398b42af8165
SHA512cc2ecbae01bdcf2ba86f5410df4b54988778083b74a713394b091bb53975c69f05a2318433ee521ee9b631091b65659d920387393090defc0a9c4569adbed310
-
Filesize
1KB
MD506a830b3598bbc8719085952c8d518a6
SHA120a591a34cf862a86b38e9f6622801388a8fc09d
SHA25660d6f7c281326d4d6306e97575335cebad393c925090568c2b86b84c97c07e09
SHA512cdcaf3817421610704a45d3d7637599755ff5660f1b34a9066f22e70c82d58771232c78ee0c09686f4f2ba3f4bfd0515c41cb6c4f0da0123453d601557448de5
-
Filesize
1KB
MD5ae4853608e7ebaae5b2ea84d7e26d30b
SHA17c26b1823c632e97391756281824db00079ec56f
SHA256c079c39a1b7ec1e977c6f7e1c8624dbff1f7d212ea765172a68aaf441690ada8
SHA51294a41eb7f7984eaf65a9604e1ef5f88e60425a905dad136bc3f0285aaf908e5fc1743e5d796a0212a297b43bb027b2fc7f6ab5800eb0f3836b1dda54beec5e5c
-
Filesize
1KB
MD50fa8eefe28980f38ba7f490f35ac77e8
SHA1af5582adf0dff56268aaa635edc140423a5bc91a
SHA256d89ff81f2fff3f4e25391b5ce4524a61d448001115079c7315b52a8c52047a0f
SHA51243c3fbe706367fc43971b3ed96704e0eb245aa5e74feda2e7344eee3c86e0794f67981a5066f3d29726ce24e9085a423aa50017a416716e313462a12ea9f842f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbb3059c43803f13c4de6f75eeebd91e
SHA128fab286879481a685617e42321fe7ff27c82f99
SHA2562882db55db1a30c29e5dc4889e006828ee1fb0b87cd4a63d39414c73276c69b7
SHA5129a10b4a36b1e18487cee135b49d8882381efa49a0662fdf12a4f35e2ce6fd231bfb95e4787025bcb7ebac3f87d66db7e8b10554ae909b7927421702457dadbc7
-
Filesize
10KB
MD5e31bb0de74a217dab662857152ea14d0
SHA145d9af01fe50a0e5eb122d9da225167c6e7f65a4
SHA256928ed07748fcbaf7a6245007bd5f1cdb46d293e6a26599dc8b28c2e3039eba5c
SHA5121377ce4906eeb6c5c878c7d77a3ebe8bb2a2f660139df69186c19b4bbbb1b5f0a643733e0e0d9ea17475ea7aac869c670f4f80e6b4692fdea6f0b8d9e04354db
-
Filesize
10KB
MD5b2411e7c4eadf00ce4bcc18c23bc032d
SHA1954c2853244d2527c23c4faf9cd41dcbb9aa016a
SHA256521733aca877b5b461e7ff2ba8e070721085bf6a2e959b2760c9f625799b6288
SHA512a652637d7837eede8a713354d6fa940fc819eae94603f684352e28a07fddfc951252006defb19a8528818a4ae4f5afe23b614454ed084a40edf16b2335bc3711
-
Filesize
11KB
MD50f350f46b51fc699c2f9ea05fddf3731
SHA1bc59e12aa032dad6f816e62c84d6be7831b1ccfc
SHA256378f1d71659c580a6de0a30c9b48965c209e2b09e3fba27a861a1e752ddc34a5
SHA512075bdc2f396dde7afb12066b0461f1d2f982b1c7e5b786f910ed02574b2dc4a454e2455f678fe37194c0c637d7f40e6bc69cd1894e740f92c5aa9e2d375d1148
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
128KB
MD5683567ce5eb4faa5fcb77a7f8853be37
SHA196fc5786769c110956a8055f56ed1ad4341c0c80
SHA256f57f230c50ea7e274db9fa7b49bfcb57e8edabd25cdfca48bb385ef3f912888d
SHA5120efb64699520b69904c1fab6f3b792ea9690a67ca7ee216a4c2cdd7fdaa1cdad55004c89234b9f06b25bf2712040758a36f0ac6f8f76c9e01d6128294b77a355