Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10virus/Fidd...st.exe
windows10-ltsc 2021-x64
9$PLUGINSDI...up.exe
windows10-ltsc 2021-x64
9$PLUGINSDI...em.dll
windows10-ltsc 2021-x64
3Analytics.dll
windows10-ltsc 2021-x64
1Be.Windows...ox.dll
windows10-ltsc 2021-x64
1DotNetZip.dll
windows10-ltsc 2021-x64
1EnableLoopback.exe
windows10-ltsc 2021-x64
7ExecAction.exe
windows10-ltsc 2021-x64
1FSE2.exe
windows10-ltsc 2021-x64
3Fiddler.exe
windows10-ltsc 2021-x64
4ForceCPU.exe
windows10-ltsc 2021-x64
1GA.Analyti...or.dll
windows10-ltsc 2021-x64
1ImportExpo...ts.dll
windows10-ltsc 2021-x64
1ImportExpo...rt.dll
windows10-ltsc 2021-x64
1Inspectors...on.dll
windows10-ltsc 2021-x64
1Inspectors...or.dll
windows10-ltsc 2021-x64
1Inspectors...es.dll
windows10-ltsc 2021-x64
1Inspectors...ax.dll
windows10-ltsc 2021-x64
1Inspectors...rd.dll
windows10-ltsc 2021-x64
1Inspectors...ew.dll
windows10-ltsc 2021-x64
1Newtonsoft.Json.dll
windows10-ltsc 2021-x64
1Plugins/Ne...ws.dll
windows10-ltsc 2021-x64
1ScriptEdit...cs.dll
windows10-ltsc 2021-x64
1ScriptEdit...or.dll
windows10-ltsc 2021-x64
1ScriptEdit...on.dll
windows10-ltsc 2021-x64
1ScriptEdit...or.dll
windows10-ltsc 2021-x64
1ScriptEdit...rs.dll
windows10-ltsc 2021-x64
1ScriptEdit...ax.dll
windows10-ltsc 2021-x64
1Scripts/Fi...on.dll
windows10-ltsc 2021-x64
1Scripts/Fi...on.dll
windows10-ltsc 2021-x64
1$PLUGINSDI...em.dll
windows10-ltsc 2021-x64
3virus/Froz...ED.exe
windows10-ltsc 2021-x64
10Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11/12/2024, 18:28
Behavioral task
behavioral1
Sample
virus/FiddlerSetup.5.0.20245.10105-latest.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/FiddlerSetup.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Analytics.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Be.Windows.Forms.HexBox.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
DotNetZip.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral7
Sample
EnableLoopback.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
ExecAction.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral9
Sample
FSE2.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral10
Sample
Fiddler.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral11
Sample
ForceCPU.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral12
Sample
GA.Analytics.Monitor.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
ImportExport/BasicFormats.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral14
Sample
ImportExport/VSWebTestExport.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
Inspectors/QWhale.Common.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral16
Sample
Inspectors/QWhale.Editor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral17
Sample
Inspectors/QWhale.Syntax.Schemes.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral18
Sample
Inspectors/QWhale.Syntax.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral19
Sample
Inspectors/Standard.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral20
Sample
Inspectors/SyntaxView.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral21
Sample
Newtonsoft.Json.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral22
Sample
Plugins/NetworkConnections/Telerik.NetworkConnections.Windows.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral23
Sample
ScriptEditor/Analytics.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral24
Sample
ScriptEditor/GA.Analytics.Monitor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral25
Sample
ScriptEditor/QWhale.Common.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral26
Sample
ScriptEditor/QWhale.Editor.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral27
Sample
ScriptEditor/QWhale.Syntax.Parsers.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
ScriptEditor/QWhale.Syntax.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral29
Sample
Scripts/FiddlerOrchestra.Addon.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral30
Sample
Scripts/FiddlerOrchestra.Connection.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral32
Sample
virus/FrozenPerm_CRACKED.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Fiddler.exe
-
Size
3.5MB
-
MD5
87bc17f56e744e74408e6ae8bb28b724
-
SHA1
3aa572388083ff00a95405d34d1189c99c7ff5be
-
SHA256
ffb24fc36ade87988f9908e848d0333ce7ffb2b4e4d0ffb43f6556246069d057
-
SHA512
cbeee155c97b87a22b92b808f86fee25c18db51ab43a36b657d532d2d47d3a7db2f4507a699b72af904bf6d5ed851d1ae1fcfb4833a57096e6c7787211c0f35d
-
SSDEEP
49152:cbvLSgf+VOdx3Vw5+mbSgwJKI0Qpvs3c2KTn4Xj9Bh:cTmgf+VOdc5vbSgwJKDP24Rf
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c06fc582-7515-4981-ba3f-2ed89e9c5a18.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241211182922.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 2688 msedge.exe 2688 msedge.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 4972 msedge.exe 4972 msedge.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 404 identity_helper.exe 404 identity_helper.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 1808 Fiddler.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 Fiddler.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 4972 1808 Fiddler.exe 84 PID 1808 wrote to memory of 4972 1808 Fiddler.exe 84 PID 4972 wrote to memory of 4124 4972 msedge.exe 85 PID 4972 wrote to memory of 4124 4972 msedge.exe 85 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 5116 4972 msedge.exe 86 PID 4972 wrote to memory of 2688 4972 msedge.exe 87 PID 4972 wrote to memory of 2688 4972 msedge.exe 87 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88 PID 4972 wrote to memory of 1964 4972 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fiddler.exe"C:\Users\Admin\AppData\Local\Temp\Fiddler.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://api.getfiddler.com/r/?Win8EL2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffea68c46f8,0x7ffea68c4708,0x7ffea68c47183⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:83⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:13⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:13⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:83⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7da185460,0x7ff7da185470,0x7ff7da1854804⤵PID:5076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:13⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:13⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:13⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14772146515165666839,11815922498488463059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3484 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:568
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b712a4c83dfb3c522d032cf900e863a
SHA14f5bec4be6f4ebfa959e899ceafc62309bb1f141
SHA25631da2a41a051db11559c47feb923d4baad32a384f530013a435fa884dad64493
SHA51203b24d9307623b3a341230805f3ea662b0107c314650a51ae7e89d901cb3ad212d4219bab4d763d0aa8d50831aa0e6d4e3379573cc2f724873804578e8642898
-
Filesize
152B
MD524dada8956438ead89d9727022bac03a
SHA109b4fb1dba48ec8e47350131ae6113edd0fdecf0
SHA256bf1e5c7828e4672982b16451b5a201e65e812e98a97b87c9f2f7c22677cb4ec1
SHA51203f092a4b20a4d8cc111220b35fbf5470878b7723faeddee65b1d9cf327167053792c77864103b4530b9b9f819e32a5721b44189291dfdb5832769835ea5dd94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5056c437bd83da327014801c5198c3128
SHA1e202107c1f4505e0f693efbac0d660e69c343569
SHA256aabc97a82da7d6d29663b3f31210e85b6f4bab01b8ef46451bf255d37bf4d1b5
SHA512a57e8d005e31c45f44052d30a0cd2305683ef883b9f0ae6a515c63c18d66df3a516aef7153179486d327440df92e64057ae09eeaed83cae83bca1d836aabeb98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b9e2a235be64c7089faf88925c180449
SHA18a74e5c683e6af6d06d702bddaf9110abbfbad81
SHA2567bf34975d656adc0e5ed6a18295a99e6613e6f4ca565a4dc532d0176d78edd77
SHA512cea171425b556bd5bb151eb3a2b2b0ab2b7e7838bee3e67dedf0ffcf72c495eb7a892d3e52148f492f400d9481f92fc47e4d34734bac2b409d5273db99b0ee05
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58f930.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD591e5ac540f01cc8912028edbb4732970
SHA14edee0ffad5e0790a82412c5312e0c253565093a
SHA256be25801d5e78fd0b91dc55e820e99a323456cd1360ad840a4e8c773ac3d5c816
SHA512b52b584f8c7249dd54a4ed731646d26f74217071f87fc99ffbc8f2daefdfcc4ab4ef5d07c0da8782c27d16ae88bd54f21a05b55992e9dd9ba9e001b06a7a6636
-
Filesize
4KB
MD5ad33955808201221fb6497ce1766f053
SHA13d3101e8643f2a31ea83000917edd643521195df
SHA2561fc819de862d18cd07af5229ce29554c6779d8a6905a7dbf7347666fb5959f51
SHA51278f3827e69a3a7b072b97c977b0ac024939a813955d940cce02cdb67c68303ca4176ba9ee94c6a12e1047c4bc78a4a0dea64b40821323f8e19ce101f18666404
-
Filesize
5KB
MD52154fc616f03dcc90dd848247eb03547
SHA1b88c16eae5854f2fcc45ecb0c1bf6b22b493e389
SHA25630579b5ab87373b359443c5745aed917cbbfb27b56ed32c4f965c3a0da24176d
SHA512f5004659735dbb1192f6827f3932058a2e96352cbbf70c7ef96be1f465a096ff211e87c6442fef0b05d8607f9314438684d2daca8e34dc4d4064c8b8e943bd20
-
Filesize
24KB
MD599a7edf9124dba808b6d025b14aea278
SHA1f1de2fdd81ea87ee78e8afdc1a7cdffcf62a92ef
SHA2569d38a8d193a503b9be7b39be5d150bcf22038c84fbf3d53979e2f075a35b9089
SHA512fc371b7ad5606a9948ba4a315e40a0a93592f57103be4a3712020977b43e4277d95d74ff35e490239dbce1cc475fe1d1746764f5970d2e9f04483c985268f5c7
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b47535ca-469f-45e4-ae9f-3e7e915778ac.tmp
Filesize595B
MD5c543b48bfc8ad06e143fdba17c2e0692
SHA11e63057b6ede3cf5c3989f21e5c822711f3cd5f2
SHA2564be4a56965ef9fbe1b71e5ab6a1389b9b7ad012fb6553ef5dd71fd94af795e31
SHA51228ced5277f78250a3b50deee66c3102942da7fd2efb7892045ada1a9514c34961414e0a4f5e4acbe8319caf85bd47b28ddf16074a9d6eb514521f646bb9e1b53
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c1fbf972-9500-4ad3-8488-76d4bdfb9141.tmp
Filesize24KB
MD585eca930a791cbcb1373f5fdaf17857b
SHA1ffea7d54e9803374a484f1e4c124766e80024efc
SHA256fbc990061790350f00dc28f2dda277aac81bb8385a6e92e90a20101436c3312c
SHA5122ffe0de3f80ac60f2ffa55f334026979e6be328b7c69f4603aa3c5d1bfa6c3b3744d86ac2a34ecf904d0a41b36bc485392ece58f6cc89d7ffca293d02efe5bed
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD575dfd61b6644d20f382fa932376a7884
SHA14b14b04df4fda4b59e70672537435d59150ac684
SHA2564ef74a3178eae15774c04c89880d939088d250cd966abbe175430bebe22375eb
SHA51279aeda2fdbe7d6e71075854d0a13a00f7a9fded0b0c0d9a1fd391efb049c89c2981b858c3bf5baa8e35bea7ab9a4c33c992bc5b6962e8b3b7ee343c4be731f54
-
C:\Users\Admin\AppData\Local\Progress_Software_Corpora\Fiddler.exe_Url_sblwdlp4jxb3bmuxfbi1zl1jd5acanau\5.0.20245.10105\user.config
Filesize966B
MD58482f2905de9ea6643164caf63040ad7
SHA1834d731b3aae80b0ac1d001bb2ca76e3c76e1993
SHA256b5b84748dcf4bfd1eaf2c7b03fab2178c914794f773ac3b781ac3941bf6f6be2
SHA5127c8c3cd3937078e13a80b24f28a0056351479ecd34819e4422bfb1d45dd83977c0456b1a80d2dfa585a59c6796305eec4184b77246248a05b9877743f5143249
-
C:\Users\Admin\AppData\Local\Progress_Software_Corpora\Fiddler.exe_Url_sblwdlp4jxb3bmuxfbi1zl1jd5acanau\5.0.20245.10105\user.config
Filesize1KB
MD519a4d2c11c29e1904b03edc325674e54
SHA13d11425bea276edbd9121454bbc9751330fe5f87
SHA256e4bd6a33928c66fa6df5a1ab856cfebfeef984cd0ca3422ba86b2fac62401db4
SHA51240c514429c525c930794d0f5cef6a377fd855f55ef30d07b27c0970e0719b3fb5a08ba9fafb6998383560d459c2188bd3196429f270eafc26baf881eb3caf313
-
C:\Users\Admin\AppData\Local\Progress_Software_Corpora\Fiddler.exe_Url_sblwdlp4jxb3bmuxfbi1zl1jd5acanau\5.0.20245.10105\user.config
Filesize1KB
MD55fa8d267f32f3611c56227ce77bf3f09
SHA10221f916fa51e847a886563299e83c8bd0defda3
SHA256efee091a4f36f3793b5f789edcb6f28a325ce46d1258e17262ac48381a8ff060
SHA512977188e23a0724c978aaa2d1a16719f5d35ce61ff403abb66b1e710d6e1778efac13e9bb06ac85d6e3ac7f9ca5c5d7166c600046f84f527f89fd0427934684d4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5176032804eb611c94264637f30ec6518
SHA1e7d917d335d27db844cf558914189ff4e20404ac
SHA256eab854a55a82b62a45f4a8f3b6c2d9f8b122deb338d87194549aa63120ed700a
SHA51299e117946b34b568d71b3576f8e48a6a8f8d0b687df3783453b8e0e55ddc9cb88817a498ec03b9e2d47c58b354e3b2acab93cc564ef55aed7296a62c8c3218a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5b90e8c44f6d8fe444d5f9e2e3106f2f0
SHA1f815344557e975523ec1777b6adacf28a97dc427
SHA256340269689f39fdeb9ec74afdf70a628872bcd67eca5ee11409c02ee1866fd72b
SHA512c21696711a5089668773ebdda3ad4ac4f628883b5740b5def8e62f47db21f50e0e2aecc6c786b1ccf3b10852416c0d51a234309aa64d1e602516b3ba0cbc418c