Analysis
-
max time kernel
301s -
max time network
332s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2023 03:23
Static task
static1
Behavioral task
behavioral1
Sample
CvSOTN.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Arte de jogar em 4k.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Castlevania Symphony Of The Night.exe
Resource
win10v2004-20230220-en
General
-
Target
Castlevania Symphony Of The Night.exe
-
Size
390.3MB
-
MD5
d045029d9c0d3fcda1838b351437d5fa
-
SHA1
6198e10a023ddd898e3c482781b8c6489d5aab6b
-
SHA256
bfafa452310b7767fbb6cf4efe546043a1365579f082e341f75a90bf555d36d1
-
SHA512
87fbe3bbfd09953121542211b2253414fda1701bb87afb43bf3183c1e90b77c9df1976008941a614cafa8b803d38c6aa7be5527af5671096144c921c8175ede1
-
SSDEEP
12582912:DX1IMf+8QMXTb7fdZeCkBaSvVvY9mtBLF:Jg2vLdZuakxBB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Castlevania Symphony Of The Night.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 psxfin.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\73ed6f7c-c4e5-4e4f-b1c1-134b5bd3a4ef.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230415052754.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1013461898-3711306144-4198452673-1000\{B41823B2-E6CB-49DC-961A-375AB150DB0E} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Downloads" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "9" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 01000000020000000300000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1013461898-3711306144-4198452673-1000\{F5F65791-EF1D-4286-B84F-C4F781795FD0} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Generic" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 02000000010000000300000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe1000000020b727b95b45d901b47425286645d90145ec7f285b6fd90114000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 010000000200000000000000ffffffff msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2172 msedge.exe 2172 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 4296 msedge.exe 4296 msedge.exe 6124 msedge.exe 6124 msedge.exe 6124 msedge.exe 6124 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2272 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2272 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2012 OpenWith.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4168 wrote to memory of 4568 4168 Castlevania Symphony Of The Night.exe 86 PID 4168 wrote to memory of 4568 4168 Castlevania Symphony Of The Night.exe 86 PID 4168 wrote to memory of 4568 4168 Castlevania Symphony Of The Night.exe 86 PID 2172 wrote to memory of 2236 2172 msedge.exe 98 PID 2172 wrote to memory of 2236 2172 msedge.exe 98 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 4792 2172 msedge.exe 99 PID 2172 wrote to memory of 2848 2172 msedge.exe 100 PID 2172 wrote to memory of 2848 2172 msedge.exe 100 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102 PID 2172 wrote to memory of 3388 2172 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Castlevania Symphony Of The Night.exe"C:\Users\Admin\AppData\Local\Temp\Castlevania Symphony Of The Night.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\Documents\TopGameRetro\E-PSX\psxfin.exe"C:\Users\Admin\Documents\TopGameRetro\E-PSX\psxfin.exe" "[PS1] Castlevania - Sinfonia da Noite (BR).cdz"2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:3112
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:8
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:4844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.topgameretro.blogspot.com.br/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcfa1146f8,0x7ffcfa114708,0x7ffcfa1147182⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x130,0x22c,0x7ff6b1dc5460,0x7ff6b1dc5470,0x7ff6b1dc54803⤵PID:2592
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6576 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6632 /prefetch:12⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6932 /prefetch:82⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6824 /prefetch:12⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:12⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6864 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15582215615873825470,10072939713884566858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x3181⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5aaeb1f5e097ab38083674077b84b8ed6
SHA17d9191cb2277c30f1147c9d29d75fc8e6aa0a4f2
SHA2561654b27bfaeee49bfe56e0c4c0303418f4887f3ea1933f03cafce10352321aef
SHA512130f1b62134626959f69b13e33c42c3182e343d7f0a5b6291f7bb0c2f64b60885f5e6331e1866a4944e9b7b2e49fe798e073316fde23927ede2c348ba0e56eda
-
Filesize
152B
MD51db53baf44edd6b1bc2b7576e2f01e12
SHA1e35739fa87978775dcb3d8df5c8d2063631fa8df
SHA2560d73ba3eea4c552ce3ffa767e4cd5fff4e459e543756987ab5d55f1e6d963f48
SHA51284f544858803ac14bac962d2df1dbc7ed6e1134ecf16d242d7ee7316648b56b5bc095241363837bf0bf0afd16ca7deebe7afb7d40057604acbf09821fd5a9912
-
Filesize
162KB
MD5fdfdaf63d56b4a9cd6641d79f7159fdc
SHA118b413d8b6b9f3bec32026b7e9d9f4e5e366922f
SHA256f4dba3e15f08cf0686e6d89370ed42e8a5dafc38973501f0aa6baa9b93c720f3
SHA51206fd67f1a2d5f168c75b5b833d3222d6c0eccfadd4021173a7ec7f949971554d1c7df322b1dc512ef14941e76a9ff6445ba3bd16d940be5bc177be989ec39c2d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD545a3e3acf7f11f94e2f5caa16277217a
SHA15d9a342e8e37f2446e71fdffcad9f5246317a64b
SHA256d31c322218855deefd591f2b40167ca4aa0ac780f5c6d6e5f8d5a58e5d018b38
SHA512b2e0287e77b24d1b28942a64b88911cf6e9a803f7952d8b5aaa4b16e2dab447a0df3c7fbcfbbaea9324b8cbb6550262e1b0356d4950f3d8808abc305bcf6ad63
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD57e49cf42fc3931589b7060df9cfda74b
SHA117c23531ae649b37d06b7c3378dc2496f67c788c
SHA25604496d0d4835b803feeddb993eb948967d150272094bca3e99af25e631e39dcc
SHA512ca809cb5152de0d65a61806b0af6fbc353d69a5cff70ff247d999500a0e9b21546e1ac557f1d78eb804cbb556d128858871262713dd07d9ca2fd03f04ca244fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5801df.TMP
Filesize48B
MD5cb1d9e321a3fb9557cdd93b3479ea8ed
SHA128bc3d2cd4663fec33319362837ead687cf16fa5
SHA256665c82b10724c0c098fc906a46bc79e64081b11ffb5354a99cd6317177ade6e7
SHA512b20f63578cf10c1171c7a7f457e6f556475f686624ab1e4422b43c9413aad6628db0ce280adf13b2aaf3303e9fe4d06881c931f595bfead71676d4a8755954d7
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD54fd8d13ddfd0ac348786a473c95f144c
SHA186d090408bbe284c8bfa84b72fc43216b816b098
SHA256f3092e9daf229563344cab02017510d52f9ff273e584ea819ae7bd07d2f0a401
SHA51230d4f5612676bc7d019f36260fbf0cfc2ef852b254d73a582d5376495838bc5b3a87e76e12677cd905da0892437f283b33f2cb813f6b30619148da48f5615f52
-
Filesize
4KB
MD586332b6fb2495368676175b39c426882
SHA1dad5136095fbbd48db6dd868d5ed2aeb47a2bb02
SHA256cb3d09a6d5c4a323e3825d26d35289da4138aadb599445fe3da20c9d4562a279
SHA512410592519cdbc8ae5ce693b1e88eabbfbf15a5ff9b5477e9f7b664df71afbc8fa87d8e3ca2e1059c71d141af9f8397f2cef1bf43f83dd199ae93ed8f7ef97aa6
-
Filesize
4KB
MD5035a7ee1c272f6fa022e9c9b7d2356fd
SHA15e155b36abfd9cf11e5c388f982a76d7666c3cd8
SHA2569cf5145917573470a85ac9392a9a0d9757a3fc126e3b9dc6454a27a879f248db
SHA512397b0137e5ed2835239a4e11e38925a75b099a6c9ab323548537d14612e5a41d1e4c6984878e3e10c837851d8eebe8c942297c70fdc9b69cb82e8a327ed20f74
-
Filesize
6KB
MD53ce5f3e9444a675da98aba255f9f93de
SHA15b065c76caeb4ad5ceb10094e8add8a3dac7f0fa
SHA256a6b42bb8c831aa8d0826c89a42d1cc0d66b1a8626a00ec2f5327c0a0f8acf4a8
SHA51246760560748f59fc199dbf99bde7ae142c0b82bcea517f1e4dbdf8a9df47b090ee3dae656b902a8cfdb37d9403f32e9c8fab40003f23bb1ed5b386a27a79d9c6
-
Filesize
9KB
MD59e7019176023115c881e9ce2eb031802
SHA11c4939b7b95f9e74f1e32e471719a430e357a2a6
SHA25605d1dde9ffad9a6fc7f323cad0c1953bf475af2c0d7dec3496e804f1cd1a9d50
SHA51271957574bdc09a18cb4423f505b5bc28f8dd2cde25e81d95280e0c32658ebfa248430157fc3623f4eb41263efb73b665468f24f3b2c5348caae01b032d7e819b
-
Filesize
7KB
MD5b6eb904623be538ecb43afc91af7db64
SHA1431c01148265fc21acb5bed0483b9f31e584a728
SHA2565496afd0b7a980234842faf9a880221f145539634ad96ffc6165ca44bf69fbc6
SHA5129302639728504f5d48de7bcd50324941cafdbde2d1df8bc0dc0b1af9ab8b8ad3db6084b1377699a316faf2186eed7559bc447ccd2f153441416d662cdf3164a8
-
Filesize
24KB
MD547e94a96372e6f095b8a3fd7edc48ec0
SHA1377b68f34e5964ca8be1b1b0c1507dd7f0e5f005
SHA25615c77bafd922bd085317fd544d0fa129e3b8c814e3ba0d48936366004427732e
SHA5125bd63de2e831805b723d7ddf1343c3b721ef5b757d9ab01bf8554ef8e29ac2cc09fa104fc85d530f27d66b67280774b3ebbef6729ea3ab61ce8028ab4ba5bdad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5dc8a4188ee685aa5b6f4ef4ebbb4f16c
SHA114e93e17af2f1a2cfc435982c4c14303430ed85f
SHA256349a8e7157eef765819a12899b9a6f36316ad0342d6043fb3ff91acfdf04d95b
SHA51238053d9a2e551d70313324cb5a1ea02274334ea8514ae5efaf3ee6d69a2320ac5d436d5688d6e007d9ddf49227e8d7c5023f7da0d5b3ad84da20d186cf3cc0bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58ced4.TMP
Filesize48B
MD5077c7912568f7eb3b2e945173a4d4c54
SHA1288a1067ca936ff135bc5c8641a3bcfe3ce31988
SHA256633660bcbe1c5aab64b7a15d706e7639048152e1a3428f3354489f350250b86b
SHA51218d95885e1cb77302e55ad55341c4ef7af2fcd101130788175aa6d1f5547b06677e2e7b152bf795d5f7176879f86ce396ef36017fe60f00d017a9069f334ea4c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
372B
MD57f70e34040e2f71ea563ba82383a4c85
SHA19265a7dfcd476ef4a9bc61722e02a4d567758fac
SHA25663fc3f6bf5e123d0deb2aa9beab4c763f7ea9e39f68d7a27b6c021b7ace3a850
SHA51263cc602c899fc38ff005ead92f3f2260639b69edabb6479403b9fbd7d25777a81f3b5c1069df353c6adef0ada899b80e54bc7930d1373151bfad9ded44dc03dd
-
Filesize
1KB
MD5763948e237d60dded8a4da9777d38650
SHA136608fd438c73d8e10f649390cd43b1e31063523
SHA256d623a9876c3cc1c1cd17ac1814808a4c8747b8deb9d5e46562930d6090a7d6a5
SHA512b94ca901c02e9a2093498546051fc20f4e8f64213655e0a00d90c6fb17ca4b6fb8f8412308f608db1ce3c5a4b02a132c53ddfa9322fcbc314f357f0ce5e4c0b6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
9KB
MD5a4a88435d4469781e025ad2b751193fe
SHA14a46fee9a3b3c1c164a7ce7327d919936e884848
SHA256db5d0e22dad97a8759fb9219c8085916c298a57ab9416929d1ccf5819a5102e8
SHA51240202eba5923686e89b2c3bb7aeaf2f5d636d81549a3a45b45ada671882866953c3d4032fa992e1222a3193af1c0dd7b94bcdb73a95250ee42b771fe02b0ac39
-
Filesize
12KB
MD5ac3c33394652806e8de6b9cf90990c40
SHA137f68219befb607ae28835fb2f887a7a439b4960
SHA2567ab8981a85d7079588fb4f48efb86c7c2b3ee39db6df9a064e7507a7b6bb37d7
SHA51279edec5cb7680f7086c005128b634ec7eaa443ab5b4354870110cb7addc417d3721cd5e62b1d008024ed10a6f1af27a9cd3ac51bc69af60595007f13512f757e
-
Filesize
12KB
MD57431bdf90b41312c4a6d4bfd3ab8e97a
SHA15f091313e9a87252cc5597cf8b3b7d96a3ab8827
SHA2560b940c6cc2ac25915a4fd02beafe251cfa97ab5f74bc371922991a6e641d09ba
SHA5123a4d3e80fc227a46e2492cb7090c7197cf11dbfefc5212cb5a426be940ec76a05ece6ab5525eca7ac2682b1e8eead1730f7abb9d8eafcd9567ffae28cc171918
-
Filesize
13KB
MD56a9426718ef60bb1b6e7f8c9540611cf
SHA18d0ad72fbd95758f7b97a04043e518dad5790b6c
SHA25655abf851fcb2da02693eb0b12088bfb4300db77959dbc24316b0ac26363c7fbc
SHA512c85568d2330a3883e797cde56797e561a5f8e22ae9c8af688cfea73df5e79f604b90e69999a343434e01ab9baf30ce514c326c93139bfef294e161ba86f3d968
-
Filesize
28KB
MD5e18a8541a828d789acbdda894ddd39a6
SHA1d1bef52c73cbac23f108ff2feda4f383ba1ccda9
SHA256abc11607c1027857988c5ef7e819d63a41d832f6fb331797ba9310097314439e
SHA512afa570e3f2caf5bcbd12c4d440fa5dadba85b9fea94e65ec13905706d8b550ed15ac721120ccb7c4a91ee7e28512fb90eb70a22ba2276f32eb285afd7265cf5f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
Filesize2KB
MD5cc6db612d6b89124d2ee55de160afb60
SHA1fff5aa07158e094c975fb5ee46b3d488f4ac118d
SHA256a20896b5c75e4ac7cb022d997d4e334b0c2efe0350b28ffd98d07e31262beacc
SHA5126295bb0c94b3f37a39427fd6f386ca277bce94e0f18ddae7100c56a6462546dce8b9595b631198c3a631c7fc9f8a324b1b35ba9e96984c7cf105cf118e06d8d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD50df33be5ba544ff784e6763dfa5cd76c
SHA1fd53c5f181ee681fda60a6cc6303994640bebcc3
SHA256cafc01be157e1ec793dd3f4367df0f20f5a15e574482ebd26f689340024eeca1
SHA512e33ca6ee4fb2021836747158e3e747d6b19aeb0485e84bebb2881fe4563fb986a83589c43b14c1cd4ec5cd9669e9b83e88fac157b598adbe5fc554ece9966961
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD57ef8bcee28e65fb7aed8bb0e711019e4
SHA17178f5c483a74b8b6e447aa9ea934fd93cd87b73
SHA256cb77268ed34fdf152c9ff6aa78bf4113d6bde12ec3488e9ddfeb91a68f4634d0
SHA512b8e35678f46e9ef30bfe39e8316479de08e4be1e90c43f3c2abe39a88f58d4ec81d709ac4f918999662e447930eca1ab4a630b2251907ec471d1fd689e2336a0
-
Filesize
512KB
MD5b9d9a0286c33dc6b7237bb13cd46fdee
SHA18d5de56a79954f29e9006929ba3fed9b6a418c1d
SHA2565e84a94818cf5282f4217591fefd88be36b9b174b3cc7cb0bcd75199beb450f1
SHA51265d56e55be7dfdfd549137a877a831f17e0e22bbb00d01f35e7ab1baa274f33cff9d786d804cdfb911504f07a7d41b6e9c8bbad409cb91fbd95fe44442979a4c
-
Filesize
128KB
MD587c95937800f391cac7bbffaa76d3f0f
SHA1bb9894884d9bfcd00937b118d655b57010be1c36
SHA2564a181f72a7427c67414dbe3c6b7d38592568923290deed6ccf7342714ac0ea8e
SHA5129666ca88618b431d3791edd13654930f23b72a8594bdca4c1b015b9af2ba3a8c4ecef3966782bc39f271624ddfd9146d6de87c7dbc471ae99cb383a696aa916e
-
Filesize
1.8MB
MD5813a8a0980e7f07e34da147d9cd603f2
SHA14821bbfa2eba20f10dfcf47d1846fae6c26c9cb4
SHA25671f9ff6a35789c3d4ea35f56e20c26f08deacfc3df184ad94b3ee678f95bfd51
SHA5123db30522496ede2f907f12f947aec661345c19f4592790b249062c228c31e2301b3e526abaed00ae2c5c2242d8c792ae494067ee799197f51c51ca6862b8b432
-
Filesize
1.8MB
MD5813a8a0980e7f07e34da147d9cd603f2
SHA14821bbfa2eba20f10dfcf47d1846fae6c26c9cb4
SHA25671f9ff6a35789c3d4ea35f56e20c26f08deacfc3df184ad94b3ee678f95bfd51
SHA5123db30522496ede2f907f12f947aec661345c19f4592790b249062c228c31e2301b3e526abaed00ae2c5c2242d8c792ae494067ee799197f51c51ca6862b8b432
-
Filesize
1.8MB
MD5813a8a0980e7f07e34da147d9cd603f2
SHA14821bbfa2eba20f10dfcf47d1846fae6c26c9cb4
SHA25671f9ff6a35789c3d4ea35f56e20c26f08deacfc3df184ad94b3ee678f95bfd51
SHA5123db30522496ede2f907f12f947aec661345c19f4592790b249062c228c31e2301b3e526abaed00ae2c5c2242d8c792ae494067ee799197f51c51ca6862b8b432
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c