File name:

Fairies_0.3.11_x64-setup.exe

Full analysis: https://app.any.run/tasks/cc62f124-1b61-4814-b915-334ada41d0c9
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 27, 2025, 23:32:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

F0BD3F4CE16BF482382BB9A2DB775621

SHA1:

E13D4F885AB8DF8F1E61E5AB915DD894C6DB5E37

SHA256:

9167685D6FE985B04F51927D85B9F7FF6595B9BAD58879A20CF8268F5663452A

SSDEEP:

98304:0J8Eo1LneSACRxPcZ5ITQrfoa4Y5lSDZlwUQazdemAMtjp8CdOltEI5itfm/usOB:02fzFbDbd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • The DLL Hijacking

      • msedgewebview2.exe (PID: 1240)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6032)
    • Scans artifacts that could help determine the target

      • msedgewebview2.exe (PID: 2504)
    • Changes powershell execution policy (Unrestricted)

      • Fairies.exe (PID: 6028)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 6032)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • There is functionality for taking screenshot (YARA)

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • The process creates files with name similar to system file names

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Process requests binary or script from the Internet

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Process drops legitimate windows executable

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
    • Searches for installed software

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • setup.exe (PID: 4408)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Executable content was dropped or overwritten

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • powershell.exe (PID: 6032)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7608)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7636)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7580)
      • MicrosoftEdgeUpdate.exe (PID: 7552)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • msedgewebview2.exe (PID: 2504)
    • Application launched itself

      • setup.exe (PID: 4408)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • msedgewebview2.exe (PID: 2504)
    • Creates a software uninstall entry

      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Removes files via Powershell

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Download files or web resources using Curl/Wget

      • Fairies.exe (PID: 6028)
    • Manipulates environment variables

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6032)
    • The process bypasses the loading of PowerShell profile settings

      • Fairies.exe (PID: 6028)
    • Starts POWERSHELL.EXE for commands execution

      • Fairies.exe (PID: 6028)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 6264)
    • Probably obfuscated PowerShell command line is found

      • Fairies.exe (PID: 6028)
    • Probably download files using WebClient

      • Fairies.exe (PID: 6028)
    • Hides errors and continues executing the command without stopping

      • powershell.exe (PID: 6032)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 6032)
  • INFO

    • The sample compiled with english language support

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
    • Checks supported languages

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7552)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7580)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7636)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7608)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7752)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdateCore.exe (PID: 7944)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • setup.exe (PID: 7036)
      • MicrosoftEdgeUpdate.exe (PID: 7976)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 5332)
      • msedgewebview2.exe (PID: 1240)
      • msedgewebview2.exe (PID: 5228)
      • msedgewebview2.exe (PID: 1180)
      • msedgewebview2.exe (PID: 7572)
    • Checks proxy server information

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
      • slui.exe (PID: 5176)
      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Reads the computer name

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7552)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7580)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7608)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7636)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7752)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 7976)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • MicrosoftEdgeUpdateCore.exe (PID: 7944)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 1240)
      • msedgewebview2.exe (PID: 5228)
    • Create files in a temporary directory

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • msedgewebview2.exe (PID: 2504)
      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Auto-launch of the file from Registry key

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 7036)
      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 5332)
      • msedgewebview2.exe (PID: 5228)
      • msedgewebview2.exe (PID: 2504)
      • powershell.exe (PID: 6032)
    • Reads the software policy settings

      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • slui.exe (PID: 5176)
      • Fairies.exe (PID: 6028)
      • powershell.exe (PID: 6264)
      • powershell.exe (PID: 6032)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • setup.exe (PID: 4408)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 1180)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
    • Manual execution by a user

      • MicrosoftEdgeUpdateCore.exe (PID: 7944)
      • Fairies.exe (PID: 6028)
      • uvx.exe (PID: 7256)
    • Reads product name

      • Fairies.exe (PID: 6028)
    • Gets the execution policy for the powershell session

      • Fairies.exe (PID: 6028)
    • Disables trace logs

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Reads CPU info

      • msedgewebview2.exe (PID: 2504)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Changes the values of the environment variables via Powershell

      • Fairies.exe (PID: 6028)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (52.5)
.scr | Windows screen saver (22)
.dll | Win32 Dynamic Link Library (generic) (11)
.exe | Win32 Executable (generic) (7.5)
.exe | Generic Win/DOS Executable (3.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.3.11.0
ProductVersionNumber: 0.3.11.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Fairies
FileVersion: 0.3.11
LegalCopyright: -
ProductName: Fairies
ProductVersion: 0.3.11
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
30
Malicious processes
9
Suspicious processes
3

Behavior graph

Click at the process to see the details
start fairies_0.3.11_x64-setup.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdate.exe no specs slui.exe microsoftedge_x64_135.0.3179.98.exe setup.exe setup.exe no specs microsoftedgeupdate.exe fairies.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs powershell.exe conhost.exe no specs powershell.exe conhost.exe no specs uvx.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1180"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=1860,i,7002103661408473031,10111485186513195609,262144 --enable-features=ForceSWDCompWhenDCompFallbackRequired,RemoveRedirectionBitmap,msAggressiveCacheTrimming,msCustomDataPartition,msWebView2NoTabForScreenShare,msWindowsTaskManager --disable-features=BackForwardCache,BackgroundTabLoadingFromPerformanceManager,CloseOmniboxPopupOnInactiveAreaClick,CollectAVProductsInfo,CollectCodeIntegrityInfo,EnableHangWatcher,FilterAdsOnAbusiveSites,GetWifiProtocol,LoginDetection,MediaFoundationCameraUsageMonitoring,PreconnectToSearch,SafetyHub,SegmentationPlatform,SpareRendererForSitePerProcess,Ukm,WebPayments,msAITrackerClassification,msAbydosForWindowlessWV2,msAffirmVirtualCard,msAllowChromeWebstore,msAllowMSAPrtSSOForNonMSAProfile,msApplicationGuard,msAskBeforeClosingMultipleTabs,msAutoToggleAADPrtSSOForNonAADProfile,msAutofillEdgeCoupons,msAutofillEdgeCouponsAutoApply,msAutofillEdgeServiceRequest,msAutomaticTabFreeze,msBrowserSettingsSupported,msCoarseGeolocationService,msDataProtection,msDesktopMode,msDesktopRewards,msDisableVariationsSeedFetchThrottling,msEEProactiveHistory,msETFOffstoreExtensionFileDataCollection,msETFPasswordTheftDNRActionSignals,msEdgeAdPlatformUI,msEdgeAddWebCapturetoCollections,msEdgeAutofillAdvancedSuggestionsBasic,msEdgeAutofillOneClickAutocomplete,msEdgeAutofillSaveGSPR100InDb,msEdgeAutofillShowDeployedPassword,msEdgeAutofillSs,msEdgeBrowserEssentialsShowUpdateSection,msEdgeCloudConfigService,msEdgeCloudConfigServiceV2,msEdgeCohorts,msEdgeCollectionsPrismExperiment1,msEdgeCollectionsPrismOverallMigration,msEdgeComposeNext,msEdgeEnableNurturingFramework,msEdgeEnclavePrefsBasic,msEdgeEnclavePrefsNotification,msEdgeFaviconService,msEdgeHJTelemetry,msEdgeHubAppSkype,msEdgeImageEditorUI,msEdgeLinkDoctor,msEdgeMouseGestureDefaultEnabled,msEdgeMouseGestureSupported,msEdgeNewDeviceFre,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgePDFCMHighlightUX,msEdgePasswordIris,msEdgePasswordIrisSaveBubble,msEdgeProngPersonalization,msEdgeReadingView,msEdgeRose,msEdgeSendTabToSelf,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingPersistentStorage,msEdgeShoppingUI,msEdgeSmartFind,msEdgeSuperDragDefaultEnabled,msEdgeSuperDragDropSupported,msEdgeTipping,msEdgeTranslate,msEdgeUseCaptivePortalService,msEdgeWebContentFilteringFeedback,msEdgeWorkSearchBanner,msEnableCustomJobMemoryLimitsOnXbox,msEnableMIPForPDF,msEnablePdfUpsell,msEnableThirdPartyScanning,msEnableWebSignInCta,msEnableWebToBrowserSignIn,msEndpointDlp,msEntityExtraction,msExtensionTelemetryFramework,msExternalTaskManager,msFileSystemAccessDirectoryIterationBlocklistCheck,msForceBrowserSignIn,msForeignSessionsPage,msGeolocationAccessService,msGeolocationOSLocationPermissionFallback,msGeolocationSQMService,msGeolocationService,msGrowthInfraLaunchSourceLogging,msGuidedSwitchAllowed,msHubPinPersist,msImplicitSignin,msIrm,msIrmv2,msKlarnaVirtualCard,msLoadStatistics,msLogIsEdgePinnedToTaskbarOnLaunch,msMIPCrossTenantPdfViewSupport,msMdatpWebSiteDlp,msNotificationPermissionForPWA,msOnHoverSearchInSidebar,msOpenOfficeDocumentsInWebViewer,msPasswordBreachDetection,msPdfAnnotationsVisibility,msPdfDataRecovery,msPdfDigitalSignatureRead,msPdfFreeText,msPdfFreeTextForCJK,msPdfHighlightMode,msPdfInking,msPdfKeyphraseSupport,msPdfOOUI,msPdfPopupMarkerRenderer,msPdfShare,msPdfSharedLibrary,msPdfTextNote,msPdfTextNoteMoreMenu,msPdfThumbnailCache,msPdfUnderside,msPdfViewRestore,msPersonalizationUMA,msPriceComparison,msPromptDefaultHandlerForPDF,msReactiveSearch,msReadAloud,msReadAloudPdf,msRedirectToShoreline,msRevokeExtensions,msSaasDlp,msShoppingTrigger,msShorelineSearch,msShorelineSearchFindOnPageWebUI,msShowOfflineGameEntrance,msShowReadAloudIconInAddressBar,msShowUXForAADPrtSSOForNonAADProfile,msSmartScreenProtection,msSuspendMessageForNewSessionWhenHavingPendingNavigation,msSyncEdgeCollections,msTabResourceStats,msTokenizationAutofillInlineEnabled,msTouchMode,msTriggeringSignalGenerator,msUserUnderstanding,msVideoSuperResolutionUI,msWalletBuyNow,msWalletCheckout,msWalletDiagnosticDataLogger,msWalletHubEntry,msWalletHubIntlP3,msWalletPartialCard,msWalletPasswordCategorization,msWalletPasswordCategorizationPlatformExpansion,msWalletTokenizationCardMetadata,msWalletTokenizedAutofill,msWebAssist,msWebAssistHistorySearchService,msWebOOUI,msWindowsUserActivities,msZipPayVirtualCard --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1240"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-pre-read-main-dll --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1860,i,7002103661408473031,10111485186513195609,262144 --enable-features=ForceSWDCompWhenDCompFallbackRequired,RemoveRedirectionBitmap,msAggressiveCacheTrimming,msCustomDataPartition,msWebView2NoTabForScreenShare,msWindowsTaskManager --disable-features=BackForwardCache,BackgroundTabLoadingFromPerformanceManager,CloseOmniboxPopupOnInactiveAreaClick,CollectAVProductsInfo,CollectCodeIntegrityInfo,EnableHangWatcher,FilterAdsOnAbusiveSites,GetWifiProtocol,LoginDetection,MediaFoundationCameraUsageMonitoring,PreconnectToSearch,SafetyHub,SegmentationPlatform,SpareRendererForSitePerProcess,Ukm,WebPayments,msAITrackerClassification,msAbydosForWindowlessWV2,msAffirmVirtualCard,msAllowChromeWebstore,msAllowMSAPrtSSOForNonMSAProfile,msApplicationGuard,msAskBeforeClosingMultipleTabs,msAutoToggleAADPrtSSOForNonAADProfile,msAutofillEdgeCoupons,msAutofillEdgeCouponsAutoApply,msAutofillEdgeServiceRequest,msAutomaticTabFreeze,msBrowserSettingsSupported,msCoarseGeolocationService,msDataProtection,msDesktopMode,msDesktopRewards,msDisableVariationsSeedFetchThrottling,msEEProactiveHistory,msETFOffstoreExtensionFileDataCollection,msETFPasswordTheftDNRActionSignals,msEdgeAdPlatformUI,msEdgeAddWebCapturetoCollections,msEdgeAutofillAdvancedSuggestionsBasic,msEdgeAutofillOneClickAutocomplete,msEdgeAutofillSaveGSPR100InDb,msEdgeAutofillShowDeployedPassword,msEdgeAutofillSs,msEdgeBrowserEssentialsShowUpdateSection,msEdgeCloudConfigService,msEdgeCloudConfigServiceV2,msEdgeCohorts,msEdgeCollectionsPrismExperiment1,msEdgeCollectionsPrismOverallMigration,msEdgeComposeNext,msEdgeEnableNurturingFramework,msEdgeEnclavePrefsBasic,msEdgeEnclavePrefsNotification,msEdgeFaviconService,msEdgeHJTelemetry,msEdgeHubAppSkype,msEdgeImageEditorUI,msEdgeLinkDoctor,msEdgeMouseGestureDefaultEnabled,msEdgeMouseGestureSupported,msEdgeNewDeviceFre,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgePDFCMHighlightUX,msEdgePasswordIris,msEdgePasswordIrisSaveBubble,msEdgeProngPersonalization,msEdgeReadingView,msEdgeRose,msEdgeSendTabToSelf,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingPersistentStorage,msEdgeShoppingUI,msEdgeSmartFind,msEdgeSuperDragDefaultEnabled,msEdgeSuperDragDropSupported,msEdgeTipping,msEdgeTranslate,msEdgeUseCaptivePortalService,msEdgeWebContentFilteringFeedback,msEdgeWorkSearchBanner,msEnableCustomJobMemoryLimitsOnXbox,msEnableMIPForPDF,msEnablePdfUpsell,msEnableThirdPartyScanning,msEnableWebSignInCta,msEnableWebToBrowserSignIn,msEndpointDlp,msEntityExtraction,msExtensionTelemetryFramework,msExternalTaskManager,msFileSystemAccessDirectoryIterationBlocklistCheck,msForceBrowserSignIn,msForeignSessionsPage,msGeolocationAccessService,msGeolocationOSLocationPermissionFallback,msGeolocationSQMService,msGeolocationService,msGrowthInfraLaunchSourceLogging,msGuidedSwitchAllowed,msHubPinPersist,msImplicitSignin,msIrm,msIrmv2,msKlarnaVirtualCard,msLoadStatistics,msLogIsEdgePinnedToTaskbarOnLaunch,msMIPCrossTenantPdfViewSupport,msMdatpWebSiteDlp,msNotificationPermissionForPWA,msOnHoverSearchInSidebar,msOpenOfficeDocumentsInWebViewer,msPasswordBreachDetection,msPdfAnnotationsVisibility,msPdfDataRecovery,msPdfDigitalSignatureRead,msPdfFreeText,msPdfFreeTextForCJK,msPdfHighlightMode,msPdfInking,msPdfKeyphraseSupport,msPdfOOUI,msPdfPopupMarkerRenderer,msPdfShare,msPdfSharedLibrary,msPdfTextNote,msPdfTextNoteMoreMenu,msPdfThumbnailCache,msPdfUnderside,msPdfViewRestore,msPersonalizationUMA,msPriceComparison,msPromptDefaultHandlerForPDF,msReactiveSearch,msReadAloud,msReadAloudPdf,msRedirectToShoreline,msRevokeExtensions,msSaasDlp,msShoppingTrigger,msShorelineSearch,msShorelineSearchFindOnPageWebUI,msShowOfflineGameEntrance,msShowReadAloudIconInAddressBar,msShowUXForAADPrtSSOForNonAADProfile,msSmartScreenProtection,msSuspendMessageForNewSessionWhenHavingPendingNavigation,msSyncEdgeCollections,msTabResourceStats,msTokenizationAutofillInlineEnabled,msTouchMode,msTriggeringSignalGenerator,msUserUnderstanding,msVideoSuperResolutionUI,msWalletBuyNow,msWalletCheckout,msWalletDiagnosticDataLogger,msWalletHubEntry,msWalletHubIntlP3,msWalletPartialCard,msWalletPasswordCategorization,msWalletPasswordCategorizationPlatformExpansion,msWalletTokenizationCardMetadata,msWalletTokenizedAutofill,msWebAssist,msWebAssistHistorySearchService,msWebOOUI,msWindowsUserActivities,msZipPayVirtualCard --variations-seed-version --mojo-platform-channel-handle=1856 /prefetch:2C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2236"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\MicrosoftEdge_X64_135.0.3179.98.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\MicrosoftEdge_X64_135.0.3179.98.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{12211d3f-8cd4-47e2-b71f-60ee2bac40cb}\microsoftedge_x64_135.0.3179.98.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2504"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=RemoveRedirectionBitmap --lang=en-US --mojo-named-platform-channel-pipe=6028.4688.14748308381820251217C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exeFairies.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
4408"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\EDGEMITMP_C2A6C.tmp\setup.exe" --install-archive="C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\MicrosoftEdge_X64_135.0.3179.98.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\EDGEMITMP_C2A6C.tmp\setup.exe
MicrosoftEdge_X64_135.0.3179.98.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{12211d3f-8cd4-47e2-b71f-60ee2bac40cb}\edgemitmp_c2a6c.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcryptprimitives.dll
4572\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5176C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5228"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=1860,i,7002103661408473031,10111485186513195609,262144 --enable-features=ForceSWDCompWhenDCompFallbackRequired,RemoveRedirectionBitmap,msAggressiveCacheTrimming,msCustomDataPartition,msWebView2NoTabForScreenShare,msWindowsTaskManager --disable-features=BackForwardCache,BackgroundTabLoadingFromPerformanceManager,CloseOmniboxPopupOnInactiveAreaClick,CollectAVProductsInfo,CollectCodeIntegrityInfo,EnableHangWatcher,FilterAdsOnAbusiveSites,GetWifiProtocol,LoginDetection,MediaFoundationCameraUsageMonitoring,PreconnectToSearch,SafetyHub,SegmentationPlatform,SpareRendererForSitePerProcess,Ukm,WebPayments,msAITrackerClassification,msAbydosForWindowlessWV2,msAffirmVirtualCard,msAllowChromeWebstore,msAllowMSAPrtSSOForNonMSAProfile,msApplicationGuard,msAskBeforeClosingMultipleTabs,msAutoToggleAADPrtSSOForNonAADProfile,msAutofillEdgeCoupons,msAutofillEdgeCouponsAutoApply,msAutofillEdgeServiceRequest,msAutomaticTabFreeze,msBrowserSettingsSupported,msCoarseGeolocationService,msDataProtection,msDesktopMode,msDesktopRewards,msDisableVariationsSeedFetchThrottling,msEEProactiveHistory,msETFOffstoreExtensionFileDataCollection,msETFPasswordTheftDNRActionSignals,msEdgeAdPlatformUI,msEdgeAddWebCapturetoCollections,msEdgeAutofillAdvancedSuggestionsBasic,msEdgeAutofillOneClickAutocomplete,msEdgeAutofillSaveGSPR100InDb,msEdgeAutofillShowDeployedPassword,msEdgeAutofillSs,msEdgeBrowserEssentialsShowUpdateSection,msEdgeCloudConfigService,msEdgeCloudConfigServiceV2,msEdgeCohorts,msEdgeCollectionsPrismExperiment1,msEdgeCollectionsPrismOverallMigration,msEdgeComposeNext,msEdgeEnableNurturingFramework,msEdgeEnclavePrefsBasic,msEdgeEnclavePrefsNotification,msEdgeFaviconService,msEdgeHJTelemetry,msEdgeHubAppSkype,msEdgeImageEditorUI,msEdgeLinkDoctor,msEdgeMouseGestureDefaultEnabled,msEdgeMouseGestureSupported,msEdgeNewDeviceFre,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgePDFCMHighlightUX,msEdgePasswordIris,msEdgePasswordIrisSaveBubble,msEdgeProngPersonalization,msEdgeReadingView,msEdgeRose,msEdgeSendTabToSelf,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingPersistentStorage,msEdgeShoppingUI,msEdgeSmartFind,msEdgeSuperDragDefaultEnabled,msEdgeSuperDragDropSupported,msEdgeTipping,msEdgeTranslate,msEdgeUseCaptivePortalService,msEdgeWebContentFilteringFeedback,msEdgeWorkSearchBanner,msEnableCustomJobMemoryLimitsOnXbox,msEnableMIPForPDF,msEnablePdfUpsell,msEnableThirdPartyScanning,msEnableWebSignInCta,msEnableWebToBrowserSignIn,msEndpointDlp,msEntityExtraction,msExtensionTelemetryFramework,msExternalTaskManager,msFileSystemAccessDirectoryIterationBlocklistCheck,msForceBrowserSignIn,msForeignSessionsPage,msGeolocationAccessService,msGeolocationOSLocationPermissionFallback,msGeolocationSQMService,msGeolocationService,msGrowthInfraLaunchSourceLogging,msGuidedSwitchAllowed,msHubPinPersist,msImplicitSignin,msIrm,msIrmv2,msKlarnaVirtualCard,msLoadStatistics,msLogIsEdgePinnedToTaskbarOnLaunch,msMIPCrossTenantPdfViewSupport,msMdatpWebSiteDlp,msNotificationPermissionForPWA,msOnHoverSearchInSidebar,msOpenOfficeDocumentsInWebViewer,msPasswordBreachDetection,msPdfAnnotationsVisibility,msPdfDataRecovery,msPdfDigitalSignatureRead,msPdfFreeText,msPdfFreeTextForCJK,msPdfHighlightMode,msPdfInking,msPdfKeyphraseSupport,msPdfOOUI,msPdfPopupMarkerRenderer,msPdfShare,msPdfSharedLibrary,msPdfTextNote,msPdfTextNoteMoreMenu,msPdfThumbnailCache,msPdfUnderside,msPdfViewRestore,msPersonalizationUMA,msPriceComparison,msPromptDefaultHandlerForPDF,msReactiveSearch,msReadAloud,msReadAloudPdf,msRedirectToShoreline,msRevokeExtensions,msSaasDlp,msShoppingTrigger,msShorelineSearch,msShorelineSearchFindOnPageWebUI,msShowOfflineGameEntrance,msShowReadAloudIconInAddressBar,msShowUXForAADPrtSSOForNonAADProfile,msSmartScreenProtection,msSuspendMessageForNewSessionWhenHavingPendingNavigation,msSyncEdgeCollections,msTabResourceStats,msTokenizationAutofillInlineEnabled,msTouchMode,msTriggeringSignalGenerator,msUserUnderstanding,msVideoSuperResolutionUI,msWalletBuyNow,msWalletCheckout,msWalletDiagnosticDataLogger,msWalletHubEntry,msWalletHubIntlP3,msWalletPartialCard,msWalletPasswordCategorization,msWalletPasswordCategorizationPlatformExpansion,msWalletTokenizationCardMetadata,msWalletTokenizedAutofill,msWebAssist,msWebAssistHistorySearchService,msWebOOUI,msWindowsUserActivities,msZipPayVirtualCard --variations-seed-version --mojo-platform-channel-handle=2148 /prefetch:3C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe
msedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5332C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe --type=crashpad-handler --user-data-dir=C:\Users\admin\AppData\Local\com.fairies.app\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\admin\AppData\Local\com.fairies.app\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=135.0.7049.115 --annotation=exe=C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=135.0.3179.98 --initial-client-data=0x1a0,0x1a4,0x1a8,0x17c,0x1b4,0x7ffc894d9240,0x7ffc894d924c,0x7ffc894d9258C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6028"C:\Users\admin\AppData\Local\Fairies\Fairies.exe"C:\Users\admin\AppData\Local\Fairies\Fairies.exe
explorer.exe
User:
admin
Company:
fairies
Integrity Level:
MEDIUM
Description:
Fairies
Version:
0.2.28
Modules
Images
c:\users\admin\appdata\local\fairies\fairies.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
Total events
35 777
Read events
33 004
Write events
2 704
Delete events
69

Modification events

(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.195.49
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.195.49
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Edge Update
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.49\MicrosoftEdgeUpdateCore.exe"
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:edgeupdate_task_name_c
Value:
MicrosoftEdgeUpdateTaskUserS-1-5-21-1693682860-607145093-2874071422-1001Core{7633B200-E28E-48D0-B936-C60C3A6E453E}
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{81093D63-7825-417B-BFC8-ADC63FA4E53D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{5EA43877-C6D8-4885-B77A-C0BB27E94372}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{F6575EAC-C070-4329-8FB9-CB574A353CC3}\InprocHandler32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
218
Suspicious files
105
Text files
32
Unknown types
1

Dropped files

PID
Process
Filename
Type
7436Fairies_0.3.11_x64-setup.exeC:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeexecutable
MD5:FA04ED70DC9743693C0B62776547BBF4
SHA256:0A7FF586F6F5A830729949F301A444E4C565898463EBA1C7E907B3FE6EFC5267
7436Fairies_0.3.11_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nsiCA78.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
7436Fairies_0.3.11_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nsiCA78.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeComRegisterShellARM64.exeexecutable
MD5:B2CA6C419F03D1AF9B283E8E696504DC
SHA256:1AD04F1EF3A5C1DC31EFE1F08FAF6ABD35C0721E10D11DE31823DDBF5882E0D4
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdate.exeexecutable
MD5:BBD650A482ED31B5FD9B1C1636A08EA1
SHA256:C78F97F6E2DB213366AFB7EF57720CC0801CAFB428C436E8C8A780AB74F4C1E2
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\msedgeupdate.dllexecutable
MD5:34366289614548C60837E31DA6477A6E
SHA256:6EE3E95AA78DBD5B3F469F670072574AFA16EA00EE2A7077472BF0405F572635
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdateBroker.exeexecutable
MD5:3183363DEE370C1ADB75B36D381C37DB
SHA256:228BB625B37700C215E3B23C7E7DEEDE8931B32646CEBB80E3CFBFE9BE945EDB
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdateOnDemand.exeexecutable
MD5:23E508DF04911742E9051987A1FDDB99
SHA256:49E43D73672AA99A5E2950D2421824B405834D7F94FC8CEFD7B3984ECAB258BD
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\psmachine.dllexecutable
MD5:F10322ED75B0567C0A69DBF1163F9503
SHA256:9DB888B286DC32656B936D5E1438D39D46DA82212826F36C29DD99FCB0419803
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeexecutable
MD5:A6D59861272EE24F43DDE137AB82B116
SHA256:146DC78518FDACB266295EE49CDB48E898D74B7F23B5C08D006D64577CDD6C6D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
50
TCP/UDP connections
71
DNS requests
35
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7436
Fairies_0.3.11_x64-setup.exe
GET
301
184.30.18.9:80
http://go.microsoft.com/fwlink/p/?LinkId=2124703
unknown
whitelisted
7436
Fairies_0.3.11_x64-setup.exe
GET
200
184.24.77.33:80
http://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/52b8103e-36c0-4201-990f-35a73867132f/MicrosoftEdgeWebview2Setup.exe
unknown
whitelisted
7880
svchost.exe
HEAD
200
199.232.214.172:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bef3bb0b-b1c2-4068-a2cd-1eae1dd922b4?P1=1746401549&P2=404&P3=2&P4=NjC%2bT4%2bPAr0tWcM5g2yV1VWOGORXhsmwNiyHbdBTMUE1Sy2AvM5KMdNvEdidEzyLL9LaSSmNRfQt6AAtztZ0sg%3d%3d
unknown
whitelisted
7880
svchost.exe
GET
200
199.232.214.172:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bef3bb0b-b1c2-4068-a2cd-1eae1dd922b4?P1=1746401549&P2=404&P3=2&P4=NjC%2bT4%2bPAr0tWcM5g2yV1VWOGORXhsmwNiyHbdBTMUE1Sy2AvM5KMdNvEdidEzyLL9LaSSmNRfQt6AAtztZ0sg%3d%3d
unknown
whitelisted
GET
304
20.109.210.53:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
20.109.210.53:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
7220
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7220
SIHClient.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7220
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7220
SIHClient.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
40.126.31.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7436
Fairies_0.3.11_x64-setup.exe
184.30.18.9:80
go.microsoft.com
AKAMAI-AS
DE
whitelisted
7436
Fairies_0.3.11_x64-setup.exe
184.24.77.33:80
msedge.sf.dl.delivery.mp.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7704
MicrosoftEdgeUpdate.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7796
MicrosoftEdgeUpdate.exe
4.151.228.221:443
msedge.api.cdp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.110
whitelisted
login.live.com
  • 40.126.31.2
  • 40.126.31.73
  • 40.126.31.0
  • 20.190.159.4
  • 40.126.31.129
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.129
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
go.microsoft.com
  • 184.30.18.9
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 184.24.77.33
  • 184.24.77.30
whitelisted
config.edge.skype.com
  • 13.107.42.16
  • 52.123.243.88
  • 52.123.243.77
  • 52.123.243.196
  • 52.123.243.210
whitelisted
msedge.api.cdp.microsoft.com
  • 4.151.228.221
whitelisted
msedge.f.tlu.dl.delivery.mp.microsoft.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
7436
Fairies_0.3.11_x64-setup.exe
Misc activity
ET INFO Packed Executable Download
7880
svchost.exe
Misc activity
ET INFO Packed Executable Download
Generic Protocol Command Decode
SURICATA HTTP gzip decompression failed
Generic Protocol Command Decode
SURICATA HTTP gzip decompression failed
Misc activity
SUSPICIOUS [ANY.RUN] Sent Host Name in HTTP POST Body
Potentially Bad Traffic
ET HUNTING Terse Request for Zip File (GET)
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
No debug info