Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 15:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://limewire.com/d/27b994ee-0c38-4fb0-8767-3b7a8e2ee8ca#mmZRNIH00rM5Wk405nVt8hrmUCVnDbtQXKF29aby3ac
Resource
win10v2004-20250217-en
General
-
Target
https://limewire.com/d/27b994ee-0c38-4fb0-8767-3b7a8e2ee8ca#mmZRNIH00rM5Wk405nVt8hrmUCVnDbtQXKF29aby3ac
Malware Config
Signatures
-
Nanocore family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation adasd.exe -
Executes dropped EXE 2 IoCs
pid Process 5356 adasd.exe 5644 adasd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Host = "C:\\Program Files (x86)\\TCP Host\\tcphost.exe" adasd.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA adasd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\TCP Host\tcphost.exe adasd.exe File opened for modification C:\Program Files (x86)\TCP Host\tcphost.exe adasd.exe File created C:\Program Files (x86)\TCP Host\tcphost.exe\:SmartScreen:$DATA adasd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adasd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adasd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 559953.crdownload:SmartScreen msedge.exe File created C:\Program Files (x86)\TCP Host\tcphost.exe\:SmartScreen:$DATA adasd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5492 schtasks.exe 5572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 4924 msedge.exe 4924 msedge.exe 3036 identity_helper.exe 3036 identity_helper.exe 5260 msedge.exe 5260 msedge.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe 5356 adasd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5356 adasd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5356 adasd.exe Token: SeDebugPrivilege 5356 adasd.exe Token: SeDebugPrivilege 5324 Taskmgr.exe Token: SeSystemProfilePrivilege 5324 Taskmgr.exe Token: SeCreateGlobalPrivilege 5324 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe 5324 Taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 1524 4924 msedge.exe 87 PID 4924 wrote to memory of 1524 4924 msedge.exe 87 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 4292 4924 msedge.exe 88 PID 4924 wrote to memory of 2804 4924 msedge.exe 89 PID 4924 wrote to memory of 2804 4924 msedge.exe 89 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90 PID 4924 wrote to memory of 1064 4924 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://limewire.com/d/27b994ee-0c38-4fb0-8767-3b7a8e2ee8ca#mmZRNIH00rM5Wk405nVt8hrmUCVnDbtQXKF29aby3ac1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd96be46f8,0x7ffd96be4708,0x7ffd96be47182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6556 /prefetch:82⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5260
-
-
C:\Users\Admin\Downloads\adasd.exe"C:\Users\Admin\Downloads\adasd.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5356 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC8BE.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5492
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC93C.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5572
-
-
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5324
-
-
-
C:\Users\Admin\Downloads\adasd.exe"C:\Users\Admin\Downloads\adasd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6616 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7887999688943863253,13717003876802916556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:12⤵PID:5156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5395082c6d7ec10a326236e60b79602f2
SHA1203db9756fc9f65a0181ac49bca7f0e7e4edfb5b
SHA256b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25
SHA5127095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd
-
Filesize
152B
MD5e27df0383d108b2d6cd975d1b42b1afe
SHA1c216daa71094da3ffa15c787c41b0bc7b32ed40b
SHA256812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855
SHA512471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD580268129c59982b5578e60a3d2908df7
SHA1c77393ad38853b495ed4fda0079b3d0e89233b54
SHA256edd9b01728948ac435e77de81d0c2fc545bdc6c747ae8796af75914959b332da
SHA5123d5518e24c04cad0bd6e388feb2d1ec4f70e4ee1f1f6dccf5b46d59350045058d97694ae83ef1bbb1e46c12a32834c05441286c0177dbd0ca7fa2c9b823f768a
-
Filesize
6KB
MD5db0f5b990580f3a56fbb0da1f0f244c6
SHA196987264027bbfbc2d578f1da832bad5a0cf17f1
SHA25666450382c3ade714f0a9667d014dca4b2347cf3a8e08b3c304b463cb097729b4
SHA512e166f8c7c90a458407136e20f763c8c1c5190e98db4e47b608bed1d5983cc80c61a310abdf604df6a454a104c5b3dbd3fba530f3cc524adf205e0148ad5e99a9
-
Filesize
6KB
MD5987d244b46c84f8d80ed5153acac283d
SHA1419a89f4c5e7061dead799bc458fafb212c1296a
SHA256c3ac3441b63be5c4fe5b82b25a65b0f385c7ea3db6e2f80eb9edcf862393178e
SHA51200a507467420f3b77861773584749b2a90876e20642d243a86e447f6b5e607940339868404a5e79c9767378c753065942b61ff583626ab5558cb4e46361fd87c
-
Filesize
6KB
MD5fd753273819cb0908b0b4ca5e5abfcb7
SHA129d8f37934aa97e055c2b7945cb19ef8cfae749f
SHA2564585f06b0b087876348b83412813ff1e2dc68adfece7cb3b128747348bd1a1ac
SHA512dc8e914ad094efb384a6544e5a0c993e2c96c47753ad551c7549c89e7fa9a470b45e99e73a0e95074eea5f91dedf775efcaa0972184663244cc940d62d10d083
-
Filesize
5KB
MD539ce99ccff9056fabc285c059698d75b
SHA1a3b649be7e77f7d0aef30f1dec4768a952d82bfe
SHA256699ddeb2aece770398f55760c8610d4679b422e017cbb34f36462fee94261bde
SHA512197865928f573b913b9a3286b03d1a5345131c3af2984f6778f467d0c19d22e60fb849da06b6264c263365086be668045a9df76d729cfc5f8e6e75d048aaba5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\db4125b5f40e60705005afe796cc0071c6f09794\29bec8b9-0aac-4eb7-a052-35e3c06ba70a\index-dir\the-real-index
Filesize48B
MD5cd426e3f766a68a244682624cde337dc
SHA1c25722993982337517ce93fbf5714715600a614b
SHA2561d02d7b179c821767e5e69b5bdc6291834c30068fc1a501d30219f3902d63520
SHA51291fec6274c231e91279f12b67acdb83fb79cabffa72acec3d3d31a537adeb960d1640acdeaf9ba033e207befdea8ccfa18a24f92ce4c483529ba11b22b310656
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\db4125b5f40e60705005afe796cc0071c6f09794\29bec8b9-0aac-4eb7-a052-35e3c06ba70a\index-dir\the-real-index~RFe57f184.TMP
Filesize48B
MD54cd6dae01c99b45d9a697326e1c8e226
SHA145b0786c5551bc6380d7bc06c4fc7bd7f858abdc
SHA256b60a64337622d3b52ef3d3d2bed1b3827119b307074cadab781a50a7da9217ca
SHA512cb9b910c0a4c939b49f7c7ddd79c7eadd479573ad39da9599cad1275adb2a753b240c0b66c7181a8c149b443855e1b592cad0286753f8067b3d73b223a9a7e85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\db4125b5f40e60705005afe796cc0071c6f09794\index.txt
Filesize84B
MD535f536a52bb921418c0b6d712efcad2b
SHA1c6301346151c47f66336b29b00e2841f4ce98a78
SHA25631867670ee799e064b8d67362c2056cb5779dd72676188ae5e130026352900ae
SHA512b2289e2883f33449c96dbcd4f0bffc1c4bf13df965b91ea5b92ff86ace6c12b5d18c2a919fd075cd3ebb22b2194bfcec2bd6975b63e0f7cd02ccedc3f1f5424f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\db4125b5f40e60705005afe796cc0071c6f09794\index.txt~RFe57f1c2.TMP
Filesize91B
MD563d05a60e2ea74ed71e366f5de79a6e4
SHA128bd97ddf1484bfb995b078601da2e7aa350ebf6
SHA256ebd1e0a1a0de7e867eac9d224052b9f77ea70e631a0778e0ba390af33c620345
SHA51219ce593b0705ea02ea46da0b7f3ac6ba95b29984399caae5797ca317d01e20429edcb830c71510be99577b16a04837551fd57a68c1d29fa0fd51138809e70336
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59972197cd9857dc1c46571b2b407f32f
SHA1be241cfd63797c1252c3d7530364e841d0ac1141
SHA256066dc0a2163e4a45554ec5f85517dfee5f0131a7067e82fafd72caf261d8209c
SHA512e15f4d74e289618ca0cf26a85b6d579cc5723c1bec2d1efca4ea81e5048de4c6696dfeba56d75539638b507ffb46481f0798cf1b763ffe65ef0f97951fcf04ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f0b9.TMP
Filesize48B
MD52d16391c2a75a74bf31c24ebd4d1c5ff
SHA169106813d5f1b38b64f37d705c618fe93174a5b5
SHA25639ecc21fece315fd3086f8a688c7a67244b33fb4a767fdc164578b06e30fa4d8
SHA5124423e80a6c1a7acc4aa60f9988447c694f8e6e9012232d1ab1d4281a2bdbd220dd31f06ae4e2ad531f85fdd8d5892b324067c84f59f9cf8c970273f969d83e62
-
Filesize
1KB
MD5bbbc22194dc2dacc92ac387ac8cbe57c
SHA12ba01df1cf2675cda9a87d791f14feb66915ce50
SHA256a101b4ac417cbbcd8f38d3b9791a897647459822dfd6702649cc3853e0d27e49
SHA512fed7b96cfe16b2f008e4e37f8e4f11d19b14fa0fbbaf57616175bd031ea24fab93f51e6512423f2c61afb88d976d74b8875f983afa41fa9cc1d0207eda284f3a
-
Filesize
1KB
MD5bc8894c667bbb55966e2fd078f378c95
SHA140a22fecc888f83a90a1fa9bdf96b38e380e7856
SHA256ea127017eb38bb86ceee79dcb2ce3b78a41e2a1c29c7298dc17fb8d5b2d860b3
SHA512977912ac61ee40d95f0d2a335c7695b6e25856a664f646873450e9b929b7ddf3b520e2e37bda83ff6219becb517af0d78e8325dfe647f797913a5609d00c638f
-
Filesize
869B
MD5ee6901378ccdcad6f44fa1074d29d6cb
SHA1aff5abaed8af073f1656aadc1ce1a383f9d309c7
SHA2564962efdbfb17c4362755f7cc6b9e44ac4d7ef62f60c766b34e432d980b1a3834
SHA5123505cc06ff51f242aa530c506159c4c4573c7cc36b15ccce5f9311fe0871811cd6e20f6f99043f8584b09d0464a1fc08571489b9483de190b530d867b960d4a8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50e4b20b0459f2d29bf12b2c561ad476a
SHA1906cdb49c429f5befc0c8a09721f45367c8c9ad0
SHA2569d688fe09f44f0b1adbb2d6a08f380a2db78dbbdd4aedb509a3cf8326c7e9673
SHA5125421bbdf15eac3bc0032d3b8bd877c5a1745523d560c2c9eab49e9f1b079f08895295aa21cc2176e446097fefea8dfbb8ec67a1062387a2e6c43e0419f8c8400
-
Filesize
11KB
MD50748cfa486ae3df38998b0b8d1ebb8d2
SHA162ddee5777518eb5cd02440ed21d65017ef0db5b
SHA256a5b33a02a4fa7e2ddd4a84117105f4c987d14a47823fa007bf00e5a8e45eb9f0
SHA512112e5cfb87a90a9dd87cf40fc1babb68877d6eef5dbaa9ba786bc15302cf8579212098b8426012f3798c924f6cbf40f42ae060424618c4944b3ad0181cf270c0
-
Filesize
11KB
MD577ab5d08f803c597fab6cb156cb78a4a
SHA10185be6415b7e7676840229c7bbd8c0de92d0e9f
SHA256172bcdb370ce61e85f65b3bb726b4fd900553ab2c48154746fe3db816005ca2a
SHA5123fd2610b8481e02669ef7fdbbf075b863f1564693415ca30da739e4a7569cd1bc899fa792eb8c43095b84310152e7b5f620425f488852ca4dac44c018e281194
-
Filesize
1KB
MD528e28643305a332d49cac3c5bc95867b
SHA19ae6d61b761857727d33f17798fc6809226dc266
SHA256fdc8eb3e2d17e01f7b5db014f678930bd2f19c159eeca919712a5cf41f97ab41
SHA51222f04864314d202d213d154aeec748aaebba3ea6dac300ad771ce3102aea44df6fcf82267bef7544ce8f4094f25b05e19817702eebd3386fb63d11d0e95fe704
-
Filesize
1KB
MD5ee9991b78588a1779b0e6611102d0f8f
SHA1f3add6deb1ce3e74ae70f561a50f2cfdcb7bb8c2
SHA256248be2ab10954abfbede82da41efd36c03872ac3468f27de52b5b01bd4a96abd
SHA512fb3df0d41c89ae11e1aa5b16e8ec6b847c6052f00e0225ab7e8832aa43c066dd4634ffebf50f1fe428339b48a14eabb9aa136a1a133286bfb236b71d1559af9a
-
Filesize
203KB
MD5c7c7357d50858c366565c139c094f148
SHA1bbb5dccfedeb4383e2a7991d800e760d43b02122
SHA2565e226f92abfc21bfa52405c08c3077b91d005a3c0a4f11503d8cc68ca54417d8
SHA512b3b107369b19cc96c73d5a7c829d37b1ca67e53e19711803c35b24e1e67f8e4e155f3d274a98f86b9a32460abab41158d9f976c97cb21e67186f524b261b1ee0