File name:

Fairies_0.3.11_x64-setup.exe

Full analysis: https://app.any.run/tasks/cc62f124-1b61-4814-b915-334ada41d0c9
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 27, 2025, 23:32:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

F0BD3F4CE16BF482382BB9A2DB775621

SHA1:

E13D4F885AB8DF8F1E61E5AB915DD894C6DB5E37

SHA256:

9167685D6FE985B04F51927D85B9F7FF6595B9BAD58879A20CF8268F5663452A

SSDEEP:

98304:0J8Eo1LneSACRxPcZ5ITQrfoa4Y5lSDZlwUQazdemAMtjp8CdOltEI5itfm/usOB:02fzFbDbd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • The DLL Hijacking

      • msedgewebview2.exe (PID: 1240)
    • Scans artifacts that could help determine the target

      • msedgewebview2.exe (PID: 2504)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6032)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Changes powershell execution policy (Unrestricted)

      • Fairies.exe (PID: 6028)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 6032)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Executable content was dropped or overwritten

      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • powershell.exe (PID: 6032)
    • There is functionality for taking screenshot (YARA)

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Process drops legitimate windows executable

      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • The process creates files with name similar to system file names

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7580)
      • MicrosoftEdgeUpdate.exe (PID: 7552)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7608)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7636)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • msedgewebview2.exe (PID: 2504)
    • Application launched itself

      • setup.exe (PID: 4408)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • msedgewebview2.exe (PID: 2504)
    • Creates a software uninstall entry

      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Searches for installed software

      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Process requests binary or script from the Internet

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
    • Probably obfuscated PowerShell command line is found

      • Fairies.exe (PID: 6028)
    • Removes files via Powershell

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Starts POWERSHELL.EXE for commands execution

      • Fairies.exe (PID: 6028)
    • Download files or web resources using Curl/Wget

      • Fairies.exe (PID: 6028)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Hides errors and continues executing the command without stopping

      • powershell.exe (PID: 6032)
    • Manipulates environment variables

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Probably download files using WebClient

      • Fairies.exe (PID: 6028)
    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 6032)
    • The process bypasses the loading of PowerShell profile settings

      • Fairies.exe (PID: 6028)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 6264)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6032)
  • INFO

    • The sample compiled with english language support

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
    • Checks supported languages

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7552)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7580)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7608)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7636)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7752)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdateCore.exe (PID: 7944)
      • MicrosoftEdgeUpdate.exe (PID: 7976)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • setup.exe (PID: 7036)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 5332)
      • msedgewebview2.exe (PID: 1240)
      • msedgewebview2.exe (PID: 5228)
      • msedgewebview2.exe (PID: 7572)
      • msedgewebview2.exe (PID: 1180)
    • Create files in a temporary directory

      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • msedgewebview2.exe (PID: 2504)
      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Reads the computer name

      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7552)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7580)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7636)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 7608)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7752)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdateCore.exe (PID: 7944)
      • MicrosoftEdgeUpdate.exe (PID: 7976)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 4408)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 1240)
      • msedgewebview2.exe (PID: 5228)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdge_X64_135.0.3179.98.exe (PID: 2236)
      • setup.exe (PID: 7036)
      • setup.exe (PID: 4408)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 5332)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 5228)
      • powershell.exe (PID: 6032)
    • Auto-launch of the file from Registry key

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • setup.exe (PID: 4408)
      • msedgewebview2.exe (PID: 2504)
      • msedgewebview2.exe (PID: 1180)
    • Checks proxy server information

      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • Fairies_0.3.11_x64-setup.exe (PID: 7436)
      • msedgewebview2.exe (PID: 2504)
      • slui.exe (PID: 5176)
      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • msedgewebview2.exe (PID: 2504)
    • Reads the software policy settings

      • MicrosoftEdgeUpdate.exe (PID: 7704)
      • MicrosoftEdgeUpdate.exe (PID: 7796)
      • MicrosoftEdgeUpdate.exe (PID: 6324)
      • Fairies.exe (PID: 6028)
      • slui.exe (PID: 5176)
      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Manual execution by a user

      • MicrosoftEdgeUpdateCore.exe (PID: 7944)
      • Fairies.exe (PID: 6028)
      • uvx.exe (PID: 7256)
    • Reads product name

      • Fairies.exe (PID: 6028)
    • Changes the values of the environment variables via Powershell

      • Fairies.exe (PID: 6028)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Reads CPU info

      • msedgewebview2.exe (PID: 2504)
    • Disables trace logs

      • powershell.exe (PID: 6032)
      • powershell.exe (PID: 6264)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Gets the execution policy for the powershell session

      • Fairies.exe (PID: 6028)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6032)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 6032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (52.5)
.scr | Windows screen saver (22)
.dll | Win32 Dynamic Link Library (generic) (11)
.exe | Win32 Executable (generic) (7.5)
.exe | Generic Win/DOS Executable (3.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.3.11.0
ProductVersionNumber: 0.3.11.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Fairies
FileVersion: 0.3.11
LegalCopyright: -
ProductName: Fairies
ProductVersion: 0.3.11
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
30
Malicious processes
9
Suspicious processes
3

Behavior graph

Click at the process to see the details
start fairies_0.3.11_x64-setup.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdate.exe no specs slui.exe microsoftedge_x64_135.0.3179.98.exe setup.exe setup.exe no specs microsoftedgeupdate.exe fairies.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs powershell.exe conhost.exe no specs powershell.exe conhost.exe no specs uvx.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1180"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=1860,i,7002103661408473031,10111485186513195609,262144 --enable-features=ForceSWDCompWhenDCompFallbackRequired,RemoveRedirectionBitmap,msAggressiveCacheTrimming,msCustomDataPartition,msWebView2NoTabForScreenShare,msWindowsTaskManager --disable-features=BackForwardCache,BackgroundTabLoadingFromPerformanceManager,CloseOmniboxPopupOnInactiveAreaClick,CollectAVProductsInfo,CollectCodeIntegrityInfo,EnableHangWatcher,FilterAdsOnAbusiveSites,GetWifiProtocol,LoginDetection,MediaFoundationCameraUsageMonitoring,PreconnectToSearch,SafetyHub,SegmentationPlatform,SpareRendererForSitePerProcess,Ukm,WebPayments,msAITrackerClassification,msAbydosForWindowlessWV2,msAffirmVirtualCard,msAllowChromeWebstore,msAllowMSAPrtSSOForNonMSAProfile,msApplicationGuard,msAskBeforeClosingMultipleTabs,msAutoToggleAADPrtSSOForNonAADProfile,msAutofillEdgeCoupons,msAutofillEdgeCouponsAutoApply,msAutofillEdgeServiceRequest,msAutomaticTabFreeze,msBrowserSettingsSupported,msCoarseGeolocationService,msDataProtection,msDesktopMode,msDesktopRewards,msDisableVariationsSeedFetchThrottling,msEEProactiveHistory,msETFOffstoreExtensionFileDataCollection,msETFPasswordTheftDNRActionSignals,msEdgeAdPlatformUI,msEdgeAddWebCapturetoCollections,msEdgeAutofillAdvancedSuggestionsBasic,msEdgeAutofillOneClickAutocomplete,msEdgeAutofillSaveGSPR100InDb,msEdgeAutofillShowDeployedPassword,msEdgeAutofillSs,msEdgeBrowserEssentialsShowUpdateSection,msEdgeCloudConfigService,msEdgeCloudConfigServiceV2,msEdgeCohorts,msEdgeCollectionsPrismExperiment1,msEdgeCollectionsPrismOverallMigration,msEdgeComposeNext,msEdgeEnableNurturingFramework,msEdgeEnclavePrefsBasic,msEdgeEnclavePrefsNotification,msEdgeFaviconService,msEdgeHJTelemetry,msEdgeHubAppSkype,msEdgeImageEditorUI,msEdgeLinkDoctor,msEdgeMouseGestureDefaultEnabled,msEdgeMouseGestureSupported,msEdgeNewDeviceFre,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgePDFCMHighlightUX,msEdgePasswordIris,msEdgePasswordIrisSaveBubble,msEdgeProngPersonalization,msEdgeReadingView,msEdgeRose,msEdgeSendTabToSelf,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingPersistentStorage,msEdgeShoppingUI,msEdgeSmartFind,msEdgeSuperDragDefaultEnabled,msEdgeSuperDragDropSupported,msEdgeTipping,msEdgeTranslate,msEdgeUseCaptivePortalService,msEdgeWebContentFilteringFeedback,msEdgeWorkSearchBanner,msEnableCustomJobMemoryLimitsOnXbox,msEnableMIPForPDF,msEnablePdfUpsell,msEnableThirdPartyScanning,msEnableWebSignInCta,msEnableWebToBrowserSignIn,msEndpointDlp,msEntityExtraction,msExtensionTelemetryFramework,msExternalTaskManager,msFileSystemAccessDirectoryIterationBlocklistCheck,msForceBrowserSignIn,msForeignSessionsPage,msGeolocationAccessService,msGeolocationOSLocationPermissionFallback,msGeolocationSQMService,msGeolocationService,msGrowthInfraLaunchSourceLogging,msGuidedSwitchAllowed,msHubPinPersist,msImplicitSignin,msIrm,msIrmv2,msKlarnaVirtualCard,msLoadStatistics,msLogIsEdgePinnedToTaskbarOnLaunch,msMIPCrossTenantPdfViewSupport,msMdatpWebSiteDlp,msNotificationPermissionForPWA,msOnHoverSearchInSidebar,msOpenOfficeDocumentsInWebViewer,msPasswordBreachDetection,msPdfAnnotationsVisibility,msPdfDataRecovery,msPdfDigitalSignatureRead,msPdfFreeText,msPdfFreeTextForCJK,msPdfHighlightMode,msPdfInking,msPdfKeyphraseSupport,msPdfOOUI,msPdfPopupMarkerRenderer,msPdfShare,msPdfSharedLibrary,msPdfTextNote,msPdfTextNoteMoreMenu,msPdfThumbnailCache,msPdfUnderside,msPdfViewRestore,msPersonalizationUMA,msPriceComparison,msPromptDefaultHandlerForPDF,msReactiveSearch,msReadAloud,msReadAloudPdf,msRedirectToShoreline,msRevokeExtensions,msSaasDlp,msShoppingTrigger,msShorelineSearch,msShorelineSearchFindOnPageWebUI,msShowOfflineGameEntrance,msShowReadAloudIconInAddressBar,msShowUXForAADPrtSSOForNonAADProfile,msSmartScreenProtection,msSuspendMessageForNewSessionWhenHavingPendingNavigation,msSyncEdgeCollections,msTabResourceStats,msTokenizationAutofillInlineEnabled,msTouchMode,msTriggeringSignalGenerator,msUserUnderstanding,msVideoSuperResolutionUI,msWalletBuyNow,msWalletCheckout,msWalletDiagnosticDataLogger,msWalletHubEntry,msWalletHubIntlP3,msWalletPartialCard,msWalletPasswordCategorization,msWalletPasswordCategorizationPlatformExpansion,msWalletTokenizationCardMetadata,msWalletTokenizedAutofill,msWebAssist,msWebAssistHistorySearchService,msWebOOUI,msWindowsUserActivities,msZipPayVirtualCard --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1240"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-pre-read-main-dll --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1860,i,7002103661408473031,10111485186513195609,262144 --enable-features=ForceSWDCompWhenDCompFallbackRequired,RemoveRedirectionBitmap,msAggressiveCacheTrimming,msCustomDataPartition,msWebView2NoTabForScreenShare,msWindowsTaskManager --disable-features=BackForwardCache,BackgroundTabLoadingFromPerformanceManager,CloseOmniboxPopupOnInactiveAreaClick,CollectAVProductsInfo,CollectCodeIntegrityInfo,EnableHangWatcher,FilterAdsOnAbusiveSites,GetWifiProtocol,LoginDetection,MediaFoundationCameraUsageMonitoring,PreconnectToSearch,SafetyHub,SegmentationPlatform,SpareRendererForSitePerProcess,Ukm,WebPayments,msAITrackerClassification,msAbydosForWindowlessWV2,msAffirmVirtualCard,msAllowChromeWebstore,msAllowMSAPrtSSOForNonMSAProfile,msApplicationGuard,msAskBeforeClosingMultipleTabs,msAutoToggleAADPrtSSOForNonAADProfile,msAutofillEdgeCoupons,msAutofillEdgeCouponsAutoApply,msAutofillEdgeServiceRequest,msAutomaticTabFreeze,msBrowserSettingsSupported,msCoarseGeolocationService,msDataProtection,msDesktopMode,msDesktopRewards,msDisableVariationsSeedFetchThrottling,msEEProactiveHistory,msETFOffstoreExtensionFileDataCollection,msETFPasswordTheftDNRActionSignals,msEdgeAdPlatformUI,msEdgeAddWebCapturetoCollections,msEdgeAutofillAdvancedSuggestionsBasic,msEdgeAutofillOneClickAutocomplete,msEdgeAutofillSaveGSPR100InDb,msEdgeAutofillShowDeployedPassword,msEdgeAutofillSs,msEdgeBrowserEssentialsShowUpdateSection,msEdgeCloudConfigService,msEdgeCloudConfigServiceV2,msEdgeCohorts,msEdgeCollectionsPrismExperiment1,msEdgeCollectionsPrismOverallMigration,msEdgeComposeNext,msEdgeEnableNurturingFramework,msEdgeEnclavePrefsBasic,msEdgeEnclavePrefsNotification,msEdgeFaviconService,msEdgeHJTelemetry,msEdgeHubAppSkype,msEdgeImageEditorUI,msEdgeLinkDoctor,msEdgeMouseGestureDefaultEnabled,msEdgeMouseGestureSupported,msEdgeNewDeviceFre,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgePDFCMHighlightUX,msEdgePasswordIris,msEdgePasswordIrisSaveBubble,msEdgeProngPersonalization,msEdgeReadingView,msEdgeRose,msEdgeSendTabToSelf,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingPersistentStorage,msEdgeShoppingUI,msEdgeSmartFind,msEdgeSuperDragDefaultEnabled,msEdgeSuperDragDropSupported,msEdgeTipping,msEdgeTranslate,msEdgeUseCaptivePortalService,msEdgeWebContentFilteringFeedback,msEdgeWorkSearchBanner,msEnableCustomJobMemoryLimitsOnXbox,msEnableMIPForPDF,msEnablePdfUpsell,msEnableThirdPartyScanning,msEnableWebSignInCta,msEnableWebToBrowserSignIn,msEndpointDlp,msEntityExtraction,msExtensionTelemetryFramework,msExternalTaskManager,msFileSystemAccessDirectoryIterationBlocklistCheck,msForceBrowserSignIn,msForeignSessionsPage,msGeolocationAccessService,msGeolocationOSLocationPermissionFallback,msGeolocationSQMService,msGeolocationService,msGrowthInfraLaunchSourceLogging,msGuidedSwitchAllowed,msHubPinPersist,msImplicitSignin,msIrm,msIrmv2,msKlarnaVirtualCard,msLoadStatistics,msLogIsEdgePinnedToTaskbarOnLaunch,msMIPCrossTenantPdfViewSupport,msMdatpWebSiteDlp,msNotificationPermissionForPWA,msOnHoverSearchInSidebar,msOpenOfficeDocumentsInWebViewer,msPasswordBreachDetection,msPdfAnnotationsVisibility,msPdfDataRecovery,msPdfDigitalSignatureRead,msPdfFreeText,msPdfFreeTextForCJK,msPdfHighlightMode,msPdfInking,msPdfKeyphraseSupport,msPdfOOUI,msPdfPopupMarkerRenderer,msPdfShare,msPdfSharedLibrary,msPdfTextNote,msPdfTextNoteMoreMenu,msPdfThumbnailCache,msPdfUnderside,msPdfViewRestore,msPersonalizationUMA,msPriceComparison,msPromptDefaultHandlerForPDF,msReactiveSearch,msReadAloud,msReadAloudPdf,msRedirectToShoreline,msRevokeExtensions,msSaasDlp,msShoppingTrigger,msShorelineSearch,msShorelineSearchFindOnPageWebUI,msShowOfflineGameEntrance,msShowReadAloudIconInAddressBar,msShowUXForAADPrtSSOForNonAADProfile,msSmartScreenProtection,msSuspendMessageForNewSessionWhenHavingPendingNavigation,msSyncEdgeCollections,msTabResourceStats,msTokenizationAutofillInlineEnabled,msTouchMode,msTriggeringSignalGenerator,msUserUnderstanding,msVideoSuperResolutionUI,msWalletBuyNow,msWalletCheckout,msWalletDiagnosticDataLogger,msWalletHubEntry,msWalletHubIntlP3,msWalletPartialCard,msWalletPasswordCategorization,msWalletPasswordCategorizationPlatformExpansion,msWalletTokenizationCardMetadata,msWalletTokenizedAutofill,msWebAssist,msWebAssistHistorySearchService,msWebOOUI,msWindowsUserActivities,msZipPayVirtualCard --variations-seed-version --mojo-platform-channel-handle=1856 /prefetch:2C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2236"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\MicrosoftEdge_X64_135.0.3179.98.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\MicrosoftEdge_X64_135.0.3179.98.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{12211d3f-8cd4-47e2-b71f-60ee2bac40cb}\microsoftedge_x64_135.0.3179.98.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2504"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=RemoveRedirectionBitmap --lang=en-US --mojo-named-platform-channel-pipe=6028.4688.14748308381820251217C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exeFairies.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
4408"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\EDGEMITMP_C2A6C.tmp\setup.exe" --install-archive="C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\MicrosoftEdge_X64_135.0.3179.98.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --user-levelC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\Install\{12211D3F-8CD4-47E2-B71F-60EE2BAC40CB}\EDGEMITMP_C2A6C.tmp\setup.exe
MicrosoftEdge_X64_135.0.3179.98.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Installer
Exit code:
0
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\install\{12211d3f-8cd4-47e2-b71f-60ee2bac40cb}\edgemitmp_c2a6c.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcryptprimitives.dll
4572\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5176C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5228"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\com.fairies.app\EBWebView" --webview-exe-name=Fairies.exe --webview-exe-version=0.2.28 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=1860,i,7002103661408473031,10111485186513195609,262144 --enable-features=ForceSWDCompWhenDCompFallbackRequired,RemoveRedirectionBitmap,msAggressiveCacheTrimming,msCustomDataPartition,msWebView2NoTabForScreenShare,msWindowsTaskManager --disable-features=BackForwardCache,BackgroundTabLoadingFromPerformanceManager,CloseOmniboxPopupOnInactiveAreaClick,CollectAVProductsInfo,CollectCodeIntegrityInfo,EnableHangWatcher,FilterAdsOnAbusiveSites,GetWifiProtocol,LoginDetection,MediaFoundationCameraUsageMonitoring,PreconnectToSearch,SafetyHub,SegmentationPlatform,SpareRendererForSitePerProcess,Ukm,WebPayments,msAITrackerClassification,msAbydosForWindowlessWV2,msAffirmVirtualCard,msAllowChromeWebstore,msAllowMSAPrtSSOForNonMSAProfile,msApplicationGuard,msAskBeforeClosingMultipleTabs,msAutoToggleAADPrtSSOForNonAADProfile,msAutofillEdgeCoupons,msAutofillEdgeCouponsAutoApply,msAutofillEdgeServiceRequest,msAutomaticTabFreeze,msBrowserSettingsSupported,msCoarseGeolocationService,msDataProtection,msDesktopMode,msDesktopRewards,msDisableVariationsSeedFetchThrottling,msEEProactiveHistory,msETFOffstoreExtensionFileDataCollection,msETFPasswordTheftDNRActionSignals,msEdgeAdPlatformUI,msEdgeAddWebCapturetoCollections,msEdgeAutofillAdvancedSuggestionsBasic,msEdgeAutofillOneClickAutocomplete,msEdgeAutofillSaveGSPR100InDb,msEdgeAutofillShowDeployedPassword,msEdgeAutofillSs,msEdgeBrowserEssentialsShowUpdateSection,msEdgeCloudConfigService,msEdgeCloudConfigServiceV2,msEdgeCohorts,msEdgeCollectionsPrismExperiment1,msEdgeCollectionsPrismOverallMigration,msEdgeComposeNext,msEdgeEnableNurturingFramework,msEdgeEnclavePrefsBasic,msEdgeEnclavePrefsNotification,msEdgeFaviconService,msEdgeHJTelemetry,msEdgeHubAppSkype,msEdgeImageEditorUI,msEdgeLinkDoctor,msEdgeMouseGestureDefaultEnabled,msEdgeMouseGestureSupported,msEdgeNewDeviceFre,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgePDFCMHighlightUX,msEdgePasswordIris,msEdgePasswordIrisSaveBubble,msEdgeProngPersonalization,msEdgeReadingView,msEdgeRose,msEdgeSendTabToSelf,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingPersistentStorage,msEdgeShoppingUI,msEdgeSmartFind,msEdgeSuperDragDefaultEnabled,msEdgeSuperDragDropSupported,msEdgeTipping,msEdgeTranslate,msEdgeUseCaptivePortalService,msEdgeWebContentFilteringFeedback,msEdgeWorkSearchBanner,msEnableCustomJobMemoryLimitsOnXbox,msEnableMIPForPDF,msEnablePdfUpsell,msEnableThirdPartyScanning,msEnableWebSignInCta,msEnableWebToBrowserSignIn,msEndpointDlp,msEntityExtraction,msExtensionTelemetryFramework,msExternalTaskManager,msFileSystemAccessDirectoryIterationBlocklistCheck,msForceBrowserSignIn,msForeignSessionsPage,msGeolocationAccessService,msGeolocationOSLocationPermissionFallback,msGeolocationSQMService,msGeolocationService,msGrowthInfraLaunchSourceLogging,msGuidedSwitchAllowed,msHubPinPersist,msImplicitSignin,msIrm,msIrmv2,msKlarnaVirtualCard,msLoadStatistics,msLogIsEdgePinnedToTaskbarOnLaunch,msMIPCrossTenantPdfViewSupport,msMdatpWebSiteDlp,msNotificationPermissionForPWA,msOnHoverSearchInSidebar,msOpenOfficeDocumentsInWebViewer,msPasswordBreachDetection,msPdfAnnotationsVisibility,msPdfDataRecovery,msPdfDigitalSignatureRead,msPdfFreeText,msPdfFreeTextForCJK,msPdfHighlightMode,msPdfInking,msPdfKeyphraseSupport,msPdfOOUI,msPdfPopupMarkerRenderer,msPdfShare,msPdfSharedLibrary,msPdfTextNote,msPdfTextNoteMoreMenu,msPdfThumbnailCache,msPdfUnderside,msPdfViewRestore,msPersonalizationUMA,msPriceComparison,msPromptDefaultHandlerForPDF,msReactiveSearch,msReadAloud,msReadAloudPdf,msRedirectToShoreline,msRevokeExtensions,msSaasDlp,msShoppingTrigger,msShorelineSearch,msShorelineSearchFindOnPageWebUI,msShowOfflineGameEntrance,msShowReadAloudIconInAddressBar,msShowUXForAADPrtSSOForNonAADProfile,msSmartScreenProtection,msSuspendMessageForNewSessionWhenHavingPendingNavigation,msSyncEdgeCollections,msTabResourceStats,msTokenizationAutofillInlineEnabled,msTouchMode,msTriggeringSignalGenerator,msUserUnderstanding,msVideoSuperResolutionUI,msWalletBuyNow,msWalletCheckout,msWalletDiagnosticDataLogger,msWalletHubEntry,msWalletHubIntlP3,msWalletPartialCard,msWalletPasswordCategorization,msWalletPasswordCategorizationPlatformExpansion,msWalletTokenizationCardMetadata,msWalletTokenizedAutofill,msWebAssist,msWebAssistHistorySearchService,msWebOOUI,msWindowsUserActivities,msZipPayVirtualCard --variations-seed-version --mojo-platform-channel-handle=2148 /prefetch:3C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe
msedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5332C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe --type=crashpad-handler --user-data-dir=C:\Users\admin\AppData\Local\com.fairies.app\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\admin\AppData\Local\com.fairies.app\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=135.0.7049.115 --annotation=exe=C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exe --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=135.0.3179.98 --initial-client-data=0x1a0,0x1a4,0x1a8,0x17c,0x1b4,0x7ffc894d9240,0x7ffc894d924c,0x7ffc894d9258C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\135.0.3179.98\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge WebView2
Version:
135.0.3179.98
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\135.0.3179.98\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6028"C:\Users\admin\AppData\Local\Fairies\Fairies.exe"C:\Users\admin\AppData\Local\Fairies\Fairies.exe
explorer.exe
User:
admin
Company:
fairies
Integrity Level:
MEDIUM
Description:
Fairies
Version:
0.2.28
Modules
Images
c:\users\admin\appdata\local\fairies\fairies.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
Total events
35 777
Read events
33 004
Write events
2 704
Delete events
69

Modification events

(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.195.49
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.195.49
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Edge Update
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.49\MicrosoftEdgeUpdateCore.exe"
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:edgeupdate_task_name_c
Value:
MicrosoftEdgeUpdateTaskUserS-1-5-21-1693682860-607145093-2874071422-1001Core{7633B200-E28E-48D0-B936-C60C3A6E453E}
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{81093D63-7825-417B-BFC8-ADC63FA4E53D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{5EA43877-C6D8-4885-B77A-C0BB27E94372}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{F6575EAC-C070-4329-8FB9-CB574A353CC3}\InprocHandler32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
218
Suspicious files
105
Text files
32
Unknown types
1

Dropped files

PID
Process
Filename
Type
7436Fairies_0.3.11_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nsiCA78.tmp\NSISdl.dllexecutable
MD5:EE68463FED225C5C98D800BDBD205598
SHA256:419485A096BC7D95F872ED1B9B7B5C537231183D710363BEEE4D235BB79DBE04
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdateOnDemand.exeexecutable
MD5:23E508DF04911742E9051987A1FDDB99
SHA256:49E43D73672AA99A5E2950D2421824B405834D7F94FC8CEFD7B3984ECAB258BD
7436Fairies_0.3.11_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nsiCA78.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdateBroker.exeexecutable
MD5:3183363DEE370C1ADB75B36D381C37DB
SHA256:228BB625B37700C215E3B23C7E7DEEDE8931B32646CEBB80E3CFBFE9BE945EDB
7436Fairies_0.3.11_x64-setup.exeC:\Users\admin\AppData\Local\Temp\nsiCA78.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\psmachine_64.dllexecutable
MD5:1F2C831EEA682084A8D08408A9A004C4
SHA256:70991CB93309773CED85BE9FF4D687957A207FBD04F695A13273704DED1FB15B
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeexecutable
MD5:A6D59861272EE24F43DDE137AB82B116
SHA256:146DC78518FDACB266295EE49CDB48E898D74B7F23B5C08D006D64577CDD6C6D
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\MicrosoftEdgeComRegisterShellARM64.exeexecutable
MD5:B2CA6C419F03D1AF9B283E8E696504DC
SHA256:1AD04F1EF3A5C1DC31EFE1F08FAF6ABD35C0721E10D11DE31823DDBF5882E0D4
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\psmachine.dllexecutable
MD5:F10322ED75B0567C0A69DBF1163F9503
SHA256:9DB888B286DC32656B936D5E1438D39D46DA82212826F36C29DD99FCB0419803
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF762.tmp\psuser.dllexecutable
MD5:F6E8BE1734F076C3F6FF9AF3B9E9E74E
SHA256:DC79EBD95CC78B50A3FB5A16DBBBF08FCC25DFC44843D45149EF6F602EF16A45
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
50
TCP/UDP connections
71
DNS requests
35
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7436
Fairies_0.3.11_x64-setup.exe
GET
301
184.30.18.9:80
http://go.microsoft.com/fwlink/p/?LinkId=2124703
unknown
whitelisted
7436
Fairies_0.3.11_x64-setup.exe
GET
200
184.24.77.33:80
http://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/52b8103e-36c0-4201-990f-35a73867132f/MicrosoftEdgeWebview2Setup.exe
unknown
whitelisted
7880
svchost.exe
HEAD
200
199.232.214.172:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bef3bb0b-b1c2-4068-a2cd-1eae1dd922b4?P1=1746401549&P2=404&P3=2&P4=NjC%2bT4%2bPAr0tWcM5g2yV1VWOGORXhsmwNiyHbdBTMUE1Sy2AvM5KMdNvEdidEzyLL9LaSSmNRfQt6AAtztZ0sg%3d%3d
unknown
whitelisted
GET
304
20.109.210.53:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
unknown
7880
svchost.exe
GET
200
199.232.214.172:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bef3bb0b-b1c2-4068-a2cd-1eae1dd922b4?P1=1746401549&P2=404&P3=2&P4=NjC%2bT4%2bPAr0tWcM5g2yV1VWOGORXhsmwNiyHbdBTMUE1Sy2AvM5KMdNvEdidEzyLL9LaSSmNRfQt6AAtztZ0sg%3d%3d
unknown
whitelisted
GET
200
20.109.210.53:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
unknown
7220
SIHClient.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7220
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
7220
SIHClient.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
7220
SIHClient.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
40.126.31.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7436
Fairies_0.3.11_x64-setup.exe
184.30.18.9:80
go.microsoft.com
AKAMAI-AS
DE
whitelisted
7436
Fairies_0.3.11_x64-setup.exe
184.24.77.33:80
msedge.sf.dl.delivery.mp.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7704
MicrosoftEdgeUpdate.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7796
MicrosoftEdgeUpdate.exe
4.151.228.221:443
msedge.api.cdp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.110
whitelisted
login.live.com
  • 40.126.31.2
  • 40.126.31.73
  • 40.126.31.0
  • 20.190.159.4
  • 40.126.31.129
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.129
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
go.microsoft.com
  • 184.30.18.9
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 184.24.77.33
  • 184.24.77.30
whitelisted
config.edge.skype.com
  • 13.107.42.16
  • 52.123.243.88
  • 52.123.243.77
  • 52.123.243.196
  • 52.123.243.210
whitelisted
msedge.api.cdp.microsoft.com
  • 4.151.228.221
whitelisted
msedge.f.tlu.dl.delivery.mp.microsoft.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
7436
Fairies_0.3.11_x64-setup.exe
Misc activity
ET INFO Packed Executable Download
7880
svchost.exe
Misc activity
ET INFO Packed Executable Download
Generic Protocol Command Decode
SURICATA HTTP gzip decompression failed
Generic Protocol Command Decode
SURICATA HTTP gzip decompression failed
Misc activity
SUSPICIOUS [ANY.RUN] Sent Host Name in HTTP POST Body
Potentially Bad Traffic
ET HUNTING Terse Request for Zip File (GET)
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
No debug info