Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15-12-2024 12:32
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4716-417-0x0000000005C30000-0x0000000005CC4000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4716-417-0x0000000005C30000-0x0000000005CC4000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/4716-417-0x0000000005C30000-0x0000000005CC4000-memory.dmp family_sectoprat -
Sectoprat family
-
Xworm family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions perm.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions perm.exe -
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools perm.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools perm.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion perm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion perm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion perm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion perm.exe -
Executes dropped EXE 2 IoCs
pid Process 4716 perm.exe 4924 perm.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum perm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 perm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum perm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 perm.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241215123218.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\af4bc93a-574c-4c26-9631-76ad780b2d0f.tmp setup.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5060 sc.exe 3016 sc.exe 1388 sc.exe 2072 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language perm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language perm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 30 IoCs
pid Process 4124 taskkill.exe 4172 taskkill.exe 4764 taskkill.exe 4164 taskkill.exe 3080 taskkill.exe 2448 taskkill.exe 3140 taskkill.exe 1608 taskkill.exe 4812 taskkill.exe 240 taskkill.exe 4100 taskkill.exe 1068 taskkill.exe 2452 taskkill.exe 2720 taskkill.exe 1104 taskkill.exe 1712 taskkill.exe 4084 taskkill.exe 2596 taskkill.exe 4668 taskkill.exe 4048 taskkill.exe 4728 taskkill.exe 1872 taskkill.exe 820 taskkill.exe 3204 taskkill.exe 3996 taskkill.exe 2220 taskkill.exe 3524 taskkill.exe 3424 taskkill.exe 2468 taskkill.exe 4664 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-114766061-2901990051-2372745435-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 789176.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1884 msedge.exe 1884 msedge.exe 4216 identity_helper.exe 4216 identity_helper.exe 4692 msedge.exe 4692 msedge.exe 4716 perm.exe 4924 perm.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe Token: SeIncBasePriorityPrivilege 4716 perm.exe Token: 33 4716 perm.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1716 1884 msedge.exe 80 PID 1884 wrote to memory of 1716 1884 msedge.exe 80 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 3684 1884 msedge.exe 81 PID 1884 wrote to memory of 1128 1884 msedge.exe 82 PID 1884 wrote to memory of 1128 1884 msedge.exe 82 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 PID 1884 wrote to memory of 2484 1884 msedge.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.goflle.io/d/8MLl891⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffc167a46f8,0x7ffc167a4708,0x7ffc167a47182⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:1204 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff600595460,0x7ff600595470,0x7ff6005954803⤵PID:4424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6680 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:116
-
C:\Users\Admin\Downloads\perm.exe"C:\Users\Admin\Downloads\perm.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4668
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:240 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3080
-
-
-
C:\Users\Admin\Desktop\perm.exe"C:\Users\Admin\Desktop\perm.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4924 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3140
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3784
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4172
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2416
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3204
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3772
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3216 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5913cd25b0de81960e841c81a7bee8b19
SHA12c4bf2a4de37c06bea3e39898c9a98ee611b5455
SHA256b01953744098bc035aee2a21976607df9352ca42abc3e01d769e2ceee1c9bd5f
SHA512e5a879cdd1f83d6b6ee13117924522c967e2413c29722b5507b632514e28a0defbbcc942e7176f819e05df7bef37ca5133ba5efeb67a91c34b3736eec05ac8af
-
Filesize
152B
MD5de0e1d3019517b3b005d7731bbb8a355
SHA1ddf1f15c241f72585595cd30de12c4c3ce4e2f97
SHA2564ceef5b8daa774c456edd70e46668746b8fa086bb9515ed5975e6737e40dc3f0
SHA51284f7a069fd6f0713fdb9d35f17839b8755671047be477e49102f5777e8ebeeaa6421d3816727dd37f1241f4653c063fb0823ae7bab1d3001635c5075c2ba464d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD58145dcb090c53967e3c9f8c7264ca2ca
SHA16ac46777a4a96e4df1a393ffae0c8da5ef86c58e
SHA256c85df28ef602ee88ce8bce5cb6f749a8e6d1e5b027951a5b527275f2fd48a7f3
SHA51268ea979b59ba0a7c88a566506d6f5f9ce3e4846742c1a83e7d259e0fe8be5b195ace883e3a12d1eac87c3280a8979a4c97a0d2ef7eec4ba801ff3965841f2f7b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD593ca842bc4c024e54d0dd7a08a0bad38
SHA166e3bdb45fcc5c185dfeecbdddb9a7f509207b4f
SHA256912f54f2a82b9ce208a2f90ec9c242942ec9b2a7f48b27c33cd809211e0207db
SHA512c1c473e1cef910e1a8d49e33059378f07e392eb85e19d3f7b067dc652fa4f80380ff7d02c5327e86ab5944e5b924f673747380bc99cc107e8bae8870d9e63a2d
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
1KB
MD56d50c01ebd14f34b06a35e7dc7a45f2c
SHA17877df56127d3268ed7c0c9789e524ff5617a694
SHA256f92af441e18bb20cef0a581d5c5f20191602d13c5bcff4dd6ae31803a9190f8f
SHA5121c8bd913c4723d48a36b54f84a88c9a048178e4bcfaca64e825f01ebbd66f81e88e007f66d8d52b6b52802132e2bef78bf191731b8356b0c78366a04cb862b72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe57ca55.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
6KB
MD55ea94f123918c4346b1e7dddd488e18e
SHA1ca041752f2841b8e777d13c4ba6aae01dc752011
SHA256aeadc1aa7e2de06463a76e1bce785bd6eb316e58148f055aa221e7448d4a7a7f
SHA5123c6e40b90316c35fbd4ab1f06e9bedb67ffd13106e2569501a447153b4461db916fd34ab9aa045d542b8c277701e0556e55919e702887e7393271c671d099e2c
-
Filesize
5KB
MD546bba1a0a2614bffcfa0bf5c44be5fe9
SHA1a0ebd4ae8086f5085fd6d2fe9b0a1e86f26623a6
SHA256888af3867916dbc1ba5e5bd2543f83824aaaba8a28b2ed7a2b1c6b880dc38421
SHA512435a661fa569ca47c0ca847113ca3208236d7afd2b8aa73bcfeaa874755dd9a23a214329347b8b2dbb61e1f382224ccef8679905047e2dca60aad3f5e7e489a7
-
Filesize
6KB
MD5fb99bf7becbbc4224186e4366aaad427
SHA15940554dfcc3e9d82faa4846db2dcdb5b46bb5da
SHA256470b8138aecde81a19d4c0e25ce03f84b1ca2da328ff7d35507682425a0e0dcf
SHA512c16341a60c342453612082327dc222e642a02bef2eca5e1734288bd3068feedbd63c1c42b381c58d57f8cc040eae6ddea72118e18486f98565f3e402fdcb4d18
-
Filesize
7KB
MD56577fd6114bebd042cedddc9a5640e0f
SHA105240dd111378573df0a59280146dee2e32f426b
SHA256ab3d57804b07cfe2a6e0dc9b30cf76ae979082b7872b9f9ef9e36b646f4b6de8
SHA512e8b3c01f8f06468166d1d664a2d626e6de8f76a7fe5097017b57b4b640317f825d19973abaefbede8645e33a977d55b41dc7a25831c8f75f3953b0d14d860136
-
Filesize
24KB
MD5832b664db8c95c83ff39b95fac93bb5b
SHA19d244b3081440efd5dcb15c341b2e790e5af359c
SHA256d1d1d00928970105a43609aa8e2516b41e9473ac285cb591fecaf74b69213487
SHA5120d46d177ca250277b341f04e3e4565b048069a14993bd1d89d38d03ac8cc4b499dcb2c181bd86f12f903054923a3bb47787d229ee975d900dfd6297db22c246b
-
Filesize
24KB
MD5cc420cc45f686797b102b94f6bfda2ee
SHA12b0b5d4848cc346c341cbd51d5fc6ce8a08910e7
SHA25623f845e57c6718a65f93b97ac9c425d7abaad84f75e77e662c4df298305b9a19
SHA5122410ec9ef56e8ad547219c4ffde2d02ab4fe8ea668c51f6519e224805770375427a4db95eab5e5f062ebdf36323c5bf03d1633508776fa553da2e8c408846092
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
10KB
MD5477065959c1ca9996ea2c448399448e1
SHA1ff1b322dd14d980ec5b8a3e9b36e0520492b8ba8
SHA256f3786401220aeb927a0bb49da6239812267d4fce9730af52284cea1f61d731d3
SHA51234ca456260593dd52cd994033f93c86219f0fac38e4c9db9e7bdfd99ffdc11d06b9ee344dfbfa40e4a3daa9f2535c3cdd137b18ff5ceb5f1bbba37fd279f910c
-
Filesize
8KB
MD5365e40cc8723c76177703b3f0ee9a73e
SHA134b48563c4369a824c7c0e0c894238abba3386ac
SHA256ec0faee5aabd5eb34319a78071b60fc7b5250610f9f7841c807ab73fecd250cf
SHA512ff21d9363602bceb2070a9144e8e6b32d75feca87630a9316d3e2b6ff661a9add11f493de2b268d56f696d6bd5f2d55dc836e082c54a01d65476e614b5c5dc60
-
Filesize
10KB
MD55ed358f0799b814e6182ab684c556422
SHA1a61c770eeaab2c19b18c7e2bc9ac4822f6ee66ed
SHA2560f71c8d030f12d59e1a4e0ccbc68d81afa57ca1af93fde4f3b76d764c5d0c074
SHA512323e9fdb7cb35d43c92d82a32d999d3f3d0796ee77d0b4a1b8cb15381d05ebafef33454e4102beeb1054886ea6bba632e73cca379debc64197aa5d6ec6838b16
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5efe8a888aa856d71aa8ac801602299a1
SHA1e39d0a277a69d3ef8edf61e87efcb32bc4008756
SHA2561876b828cba5001fb9e95cf78e1d34a8b151e707a1c5994e8208514eaf715f25
SHA512e9a84aa0c5d07387da723642f42c3e655da898bc5a4fd765c94e35958c53dd59e7cd77f54a34d5cd6c2bcd1628d476fe72e150dd9e9b9b3302e7bf3b30b17ffc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD58403977211f6e80bd8924cb4268fcc02
SHA18f9ad2eb07707838cb22916fe729a1e5d72db9a0
SHA2560e158da0a55d9b2d756ad23557a16c1e426b41023f5d1ede602ba5766226a73c
SHA5127ad6c34066baebf45d963683e7351caa0adc18ada0f930146945da538c26b68dc077e1847957b62692d336c7c4e74d976e7fad089ec803ac9567cffab0756c47
-
Filesize
4.6MB
MD5cd15473be3b87cf2f089fe3a652d0d08
SHA15fecdc548d7c9e134940509d4b002dd36deda1ef
SHA25627088c28c0f31bf50d35890675acb14a9da0b2bf574a03c79040e640bd1fbe96
SHA512cdd2f2dbc59942999082bd62bd869b66bf80b525d7b7244cb6527540bb288a50844f6d078f21c319d6888d02efca5a73ed054c16a544958ef40e215a54336477