Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 19:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://88.151.192.52/ukr/client.exe
Resource
win10v2004-20250129-en
General
-
Target
http://88.151.192.52/ukr/client.exe
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 6 2996 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000c000000023b63-36.dat net_reactor behavioral1/memory/4740-708-0x0000000000360000-0x0000000000380000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
pid Process 4740 client.exe 5788 client.exe 6044 client.exe 5940 client.exe 6008 client.exe 5748 client.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4740 set thread context of 5788 4740 client.exe 148 PID 6044 set thread context of 5748 6044 client.exe 155 -
Program crash 2 IoCs
pid pid_target Process procid_target 2120 4740 WerFault.exe 146 5000 6044 WerFault.exe 152 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 55 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe10000000dd13cbe62d72db01cf9ef52d3c72db01897ca6630178db0114000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 776635.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2912 msedge.exe 2912 msedge.exe 2180 identity_helper.exe 2180 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4732 msedge.exe 4732 msedge.exe 5924 msedge.exe 5924 msedge.exe 5924 msedge.exe 5924 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4100 2912 msedge.exe 84 PID 2912 wrote to memory of 4100 2912 msedge.exe 84 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 1492 2912 msedge.exe 86 PID 2912 wrote to memory of 2996 2912 msedge.exe 87 PID 2912 wrote to memory of 2996 2912 msedge.exe 87 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88 PID 2912 wrote to memory of 4104 2912 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://88.151.192.52/ukr/client.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1c9246f8,0x7ffe1c924708,0x7ffe1c9247182⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4132 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6744 /prefetch:12⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6568 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6788 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:12⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,91577987011489387,12757156159719066490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1180
-
C:\Users\Admin\Downloads\client.exe"C:\Users\Admin\Downloads\client.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Users\Admin\Downloads\client.exe"C:\Users\Admin\Downloads\client.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:5788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 8202⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:6084
-
C:\Users\Admin\Downloads\client.exe"C:\Users\Admin\Downloads\client.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6044 -
C:\Users\Admin\Downloads\client.exe"C:\Users\Admin\Downloads\client.exe"2⤵
- Executes dropped EXE
PID:5940
-
-
C:\Users\Admin\Downloads\client.exe"C:\Users\Admin\Downloads\client.exe"2⤵
- Executes dropped EXE
PID:6008
-
-
C:\Users\Admin\Downloads\client.exe"C:\Users\Admin\Downloads\client.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6044 -s 8002⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6044 -ip 60441⤵PID:6004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD537d04af7fe040412c05f24f2c6cd8f2f
SHA12443f06f4525f3d766514f122857ecc74fc2941a
SHA2561ab5a5199a050f7d642f1d2793d42657778c954a3fc31a799cdae6b5439cf725
SHA512b3449a38062566d668b5823876a48762e67959723fd1ee37168f58d150269e25300e43342611a72052b956a2602c44ca3ceb452eed1a4ab12b5f752461e32555
-
Filesize
152B
MD54c76084ef5a62345ea5fe42f496230ce
SHA1ab677a8684211939ded110b61dcecd68d3e0b606
SHA2561db95ee6e5eb9737bfb6df17177540cd05454c27f4fd73c916c39f690f749c76
SHA512d0c3578750ae89785645d31a931c598c8dba7035a17b6fb9bcd3ceb76a69c8dcb4b23ecc89ed85be30599382db72d167bf91313ec44b59778247537e14cba66b
-
Filesize
48KB
MD506e32a5d1e2d387ce562ee7aede8192d
SHA167f9d64c29663f6865d0d134db189938a92503cb
SHA25646ec4156584d2cfcd0ea2dd2eed85a0545ddf4e30a8c20c26b2ff3fc7c065317
SHA5120d1de74efa671be757ac49d1b864ed89cca90bd56114d79432ab91407ef5987d4f4573ef3f2e307b32601ab335a43f8cd1860954f986dd5d887a02ae37ea0717
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
70KB
MD53b06aa689e8bf1aed00d923a55cfdd49
SHA1ca186701396ba24d747438e6de95397ed5014361
SHA256cd1569510154d7fa83732ccf69e41e833421f4e5ec7f70a5353ad07940ec445c
SHA5120422b94ec68439a172281605264dede7b987804b3acfdeeb86ca7b12249e0bd90e8e625f9549a9635165034b089d59861260bedf7676f9fa68c5b332123035ed
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
Filesize
25KB
MD5e580283a2015072bac6b880355fe117e
SHA10c0f3ca89e1a9da80cd5f536130ce5da3ad64bfe
SHA256be8b1b612f207b673b1b031a7c67f8e2421d57a305bebf11d94f1c6e47d569ee
SHA51265903ba8657d145cc3bbe37f5688b803ee03dd8ff8da23b587f64acaa793eaea52fcb6e8c0ec5032e0e3a2faacc917406ada179706182ce757d1c02979986dd6
-
Filesize
215KB
MD52ffbc848f8c11b8001782b35f38f045b
SHA1c3113ed8cd351fe8cac0ef5886c932c5109697cf
SHA2561a22ece5cbc8097e6664269cbd2db64329a600f517b646f896f291c0919fbbef
SHA512e4c037be5075c784fd1f4c64ff6d6cd69737667ec9b1676270e2ed8c0341e14f9d6b92fde332c3d629b53ae38e19b59f05a587c8a86de445e9d65ccfa2bd9c16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5ec1731a85b15ebc82a75086bbad4dd68
SHA19229faa0aa7082c9aa30c89b04a1ca4f5fb75f77
SHA2567be0982cf8c5df49d778004b815701d534c60e29de098bced4b9e592c1b92f18
SHA512ddb2fb2e4653c9c0fb0b1ae9e2900090ab83095ea233946da26f5c36c215a9a1661de95978aaf1e7cc6ec7d59a9ffa18ce14812b92343e5b17cddec489e01bab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD511c480159083ad401d5f143f5a27e09e
SHA16366e78c27f3a64464ee96dab3ea0cbd15c84911
SHA25649c7be13c1ef959b706f28ff9728003e772e5dd306e8984c4aad1bc2f5153876
SHA5121a6ca4c187b50f4cf4817a37b5bb408818feec8ab6cf97c586d372e7421d06375ec0b5070deaa68e963ef978fbd9d702ac641f9fd931ed79494d2a75d2d8730c
-
Filesize
2KB
MD5f5ceecae4cde90093d7a6f5ee91a4dbe
SHA175e1a63f0381af249072f1052de5a8dd7897a0db
SHA256a400821784b42230e9dfbb927763243b1e0236d599506388d27750619b3dd6af
SHA51271c2eec3a759ca7d2b3a8009703f5dd06435a09e7a1fe7e31eed6c61f5b66f3dfda841cf4942d20c6688687a8b125bc1eebbed3ffac68153fd8b73ae69e94402
-
Filesize
8KB
MD5e5faa39933a7a284838bbe5c1724bb53
SHA1c03099090101d9c2076d870ccb8408a9c363280f
SHA2567b97aa10602935ee72b203b55adef6967c1d5f831860b10d8986d1fbdafe5635
SHA51237f2ad8d77a84aa2000c3d27c60442466fee3576e8ce8c1d78fba68e4baccb5602d8d1c14cb570a413a7d698ddc6d06645963dcf333620675018846d7e73f5ee
-
Filesize
6KB
MD589a8a7cbe0f843d206833f9f8551d97b
SHA1be63ac6ddca49b23dab79c92ddfbd498bef4a6cd
SHA25605c7201af55a49ec6b642ad03ba8cda61f3f7b775e18ae4ac942e19d19b2aab6
SHA512b05bba5284c79f9564b30d432e78b1fc01c9ff4bbc612ebb18aa5bf5a7b9cf664a053e8a4a3aa6c26f81bc7cba67c1c7405988e2cab29efb6e00befd44fd3cba
-
Filesize
8KB
MD51922c5234367fe1adfb50c9be4ecbe51
SHA1b23e16c5ef6ab37e7a341fe5a35ea683236a2c7f
SHA256fae0e2f1b1810c6223559c72c5e66a21c276ec52dc59f184b0dadc2248b8655d
SHA5125c6811f224c7bdc4ae1d3ae5762ec0269c61b31cf0bb2a8dcfa58df3574e959722946c581d119b9fb661c870a2fd174a091da97c2eeec8f616583215ec68e25e
-
Filesize
8KB
MD5a6a14e159f033c88a617e6d5f0518a3b
SHA1fac4eda7307e4baf3c63908d90bd8caa0874e924
SHA2567aaeb126ab26429ea8f258e6e12871814164828ca68435b686f2e2fde9aaf125
SHA5121a15b3e2eb758252cfa83bb83708d08a3954c748a638a7ba404498aab7663ea100270a013626e16f200dc14aec933bc639d659760166698e46ea643203bf11b4
-
Filesize
8KB
MD5987105cb19ecea00285d72daf888273a
SHA18ed8792650e15e13b2dd39c8f96b490fadbfc96e
SHA256a41d7fc5ca2fab524690e77e99eb2f0f0c4797f11b6794aeb9a218f33afb9fea
SHA51248b455d2c39b64a55b6cd088f3f5c39c14767c37158152b62ccb0a870df703c414dbd7fe8b1ed5fa6d8a1271643136c88af4bfc1f61c2cb754ccaf5a235ec84c
-
Filesize
8KB
MD5b879ecf1a1e70cf2e619488178748642
SHA19d7cedd804edcc27e2ce39c06928fd53794f123a
SHA256a1e5b141a59ad752c265101a068c844dd91564e54fae287a6988044e75fa62a9
SHA51250d82c1c870f9605e97a95459673de686122a384a8d2b3f554a398d28be2df35faf1a1645f367e450b5bd9590b69acbe17e374013cfe19cf892015f1ab864224
-
Filesize
7KB
MD5740be67ad509d34c48c4d29f430fc67f
SHA1746d3f229f3410d4dbf4d60be4825ecab050f4b9
SHA256f0f81079242c816245332f9712d447ce26efbccc12517d98668f9ec0a1b0d81c
SHA51249cab82d6440c5764ae6637a92dbd03ec338b122e4066c9e4ec66981c10867ae94e985c403a1b0b48ab36750e07e2db31360333f78dfd4a8c00900177f2f5396
-
Filesize
6KB
MD5249748db1a33f54e90023f2ae536e377
SHA1f1d5e5054fb82756d549d0b0dc3844c3fa2389b7
SHA2563d01aabed4cd2488a15a6e838865ef12145dd381a4a9281d5e2ca19e366ff26d
SHA51264479e3f8466ee0c3255ffbf279ec3fae00a4e052357258b0f42d0d5c7e271bbcf9bce8024cc99453278441d28a6f518b85dd4ec231c1a96630c37be55a34017
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD51293ff1a852b38147fbc807c4ce469f1
SHA16a16b9322962df515fe0375bf6fec9007a495d23
SHA256099b5af63237ee73ad6cc7fa7fab933bb15303e4972d1008398cab1f29fd64be
SHA512faa96f9a511cd4dc23ee72d66e4571078cc1840b9bf04adafce4560513ae25f334c3727974e06391c597987ee34464f4ad766258148a0a8741f010250eed9da2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe586116.TMP
Filesize48B
MD5e78bc91572aa95d54c9d8615c00abe80
SHA17f08587ccb3903d746642f0ea6fbbd0078e2f92c
SHA2563102c9b2945eeef016980d1e2cad0e2742e2219ae6aa3034dcdd0a19712318dc
SHA5121f1ff965c2f24c63360cc7f0f14735e579ba51990948e583020624c47adafbcce81d3f6b558fbb0b68da397cded6aeb34da83b381e468b42794469d8c12890fb
-
Filesize
1KB
MD56fccadb976c7bfed31e6135639cbe858
SHA1fe355e3612a841fe462752f9f544c476ac184340
SHA256008f3df8b31ef8b482d85e2543f27d49a692daef8e5f1883c712efe619272ab8
SHA51281c36d2f68f2c130467d950fbf6d39ffd34c527473a1cdad5c956d37c4542167c0721e579207109e5e407d92944422a68a00f4487b5f5f73ad2fafae07272d40
-
Filesize
1KB
MD597a4947a04b6b655440ef573fdf1da37
SHA1ee45e90f03230dc4d73d3df42e790ca4a5b63de4
SHA25699e26072cfd93085a7a1bf5c98568dfd14413f8e1b012a44f3013ace3167823a
SHA5121981047e052979034d7eebdf344f3b3eacef1da76bffdd0d2b91baf7f82f7fb2b44048ae732d16063a5223ae49a4023a6379a3b961e26a4a41920e6d92e3fc02
-
Filesize
1KB
MD567d88907d3312e7043b5b2f33d3efe3a
SHA12ddf65014ba2a0c8bc218eacca8db04661f62038
SHA256f7fd271c9c9ffe83e34b229535d331dd5994395e2c682d6b403050561a0a10fd
SHA5122c1facd186d83faa5318fc9471a58507b73452b0541a1f750e29a508dd4585327200de22a2d26b8a49ea4865f98736f69773b91d793e26c56edea5f76019efc3
-
Filesize
538B
MD5789e6eec4f229c6613740475e86220a2
SHA19c46fbc594c019de990b3e8766aff6cb1f35a7d4
SHA25671ff90cfa41b4e2a073994b93d99e4231d4a13ce110df7d8e19750b2c60a9fb5
SHA5121551fe32f36e055bae838103838f6c849de9b871006e79ed04459ca5ca9d7722f5e27f9ebba178b3a0bbdd24a36c7b14a75c5cdd99ceb6ab381a882937beee50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5c5c3ada3a24bb7eedde319423c204190
SHA15574727ae939f60735781ddc2c57c850a95eb083
SHA256feacf8268e40651482725e1095c9d62bb269cb34294648776536ddc8bf1c665a
SHA512d55016f5cf723050401f863c4ced3d67daf18babe12d162e5f6db51cec00f922392a34ac3734210119ce413c92c551eadbcafb8acf9f6a90eb3f25caa907b4dd
-
Filesize
11KB
MD5d5ab9bba6a6cbefcc81247a3ba6c424d
SHA12d1b2b9bf9b857407f547a780e8b0baf8cd9ef24
SHA256ff3538f54fb5385765d5e8eb787fddd8cbc64592b31716afdcd83e7798b9487c
SHA512402be9550a241b411cab6f7963efed905461ee878bf93e44879b47e953376c034b36c4bd85b86cdb94caf69cc23a5bf2d3fc3137085289e8ad0377f160774ff4
-
Filesize
11KB
MD51cdd45f3a114d5dc899fa7aa5da2e589
SHA1403c81722e21c807bf6094e051524db717547867
SHA25662f6db87d82206089700b095cb290bfa4199fbdf458082f0844e6003ac63bf0f
SHA5128e88aef88edfe61bb65ab7302b5b8492f695dc347088709eb3a549f9fe071982b4fb11aaeb8f8b46afa63a0b533460614c8263448fe329a7cae629ed5e2a4751
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD53f66d36db01b96cd5b8d967796abdc11
SHA1242658eef868345f1317cd1921e58bd2abb2601e
SHA2564f66122ec377b7cfb8048456f59c5568e8d2b9c58bcb6328c32488b8233cc630
SHA512b9a8d34aad2cf148f329ace525934fcb0f6b0487d3e06f739072350fa2be839097ced7bb39fc39929e6366e67ee988d59ff4cbb734f2d908247202893685870c
-
Filesize
103KB
MD5b53bbcfca226226405217bba4f8b2532
SHA16a84eb91adb4ec5b3b18929fb5e0bfd39cc41fb2
SHA256be09ac01404b9a32552b8bea765128a3e197a4bf77e909892d00aa2d157d6871
SHA512f8b51680dbca520ed6877ca5cc1a003258a03bdd802c69985d658375562608c004084463363c9a2ed92b7552c36ba729b1863a1693990186e0f188ff3cc1ec86