Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 15:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anonib.al/bj/res/192.html#466
Resource
win10v2004-20231023-en
General
-
Target
https://anonib.al/bj/res/192.html#466
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1872 vlc.exe 1748 vlc.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 728 msedge.exe 728 msedge.exe 900 identity_helper.exe 900 identity_helper.exe 3356 msedge.exe 3356 msedge.exe 6140 msedge.exe 6140 msedge.exe 1176 msedge.exe 1176 msedge.exe 1828 msedge.exe 1828 msedge.exe 5980 msedge.exe 5980 msedge.exe 6008 msedge.exe 6008 msedge.exe 1368 msedge.exe 1368 msedge.exe 5880 msedge.exe 5880 msedge.exe 5196 msedge.exe 5196 msedge.exe 5196 msedge.exe 5196 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1872 vlc.exe 1748 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 5484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5484 AUDIODG.EXE Token: 33 1872 vlc.exe Token: SeIncBasePriorityPrivilege 1872 vlc.exe Token: 33 1748 vlc.exe Token: SeIncBasePriorityPrivilege 1748 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 728 msedge.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1872 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 2224 728 msedge.exe 39 PID 728 wrote to memory of 2224 728 msedge.exe 39 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3476 728 msedge.exe 89 PID 728 wrote to memory of 3848 728 msedge.exe 87 PID 728 wrote to memory of 3848 728 msedge.exe 87 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88 PID 728 wrote to memory of 4040 728 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://anonib.al/bj/res/192.html#4661⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffedb346f8,0x7fffedb34708,0x7fffedb347182⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:12⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6660 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:12⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:12⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\FinestOfLeaks_240x432_1488944347886366727 (2).mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\FinestOfLeaks_240x432_1488944347886366727 (3).mp4"2⤵PID:1568
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\FinestOfLeaks_240x432_1488944347886366727 (3).mp4"2⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2116
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\MwfPIjsvKU1lw2gn (1).mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\MwfPIjsvKU1lw2gn (1).mp4"2⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5880
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\VID_20230930_021834_553 (1).mp4"2⤵PID:5028
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\VID_20230930_021834_553 (1).mp4"2⤵PID:5888
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\VID_20230930_021834_553 (1).mp4"2⤵PID:3212
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\VID_20230930_021834_553 (1).mp4"2⤵PID:5248
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\VID_20230930_021834_553 (1).mp4"2⤵PID:2608
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\VID_20230930_021834_553 (1).mp4"2⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8681003280957752360,637538609444082668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
114KB
MD52d7e48b48e9e196df70c4df3f9f14bad
SHA14c4626f20dccb7d8b78e55812da881533a4426ba
SHA256ca03450d46dd4337453f9bba40680ae1b5ee7e6c580dc68a8dacd7d481093aad
SHA51277c5e12cdc43dd4663c6bce31cd790203ac729abd2ad78778d79b7793b4f89ffdbe1dd2e28f4b80a17e208fed0c01330e657234cdd37536ef7b97b2b289b9451
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD573462054286a98225ae61b4b5e1d00d8
SHA1098896954926fd4965f214af483e62cea2dbc1b9
SHA256c8428a59f838ad2f47a5b52bd16886f1be28b3e61e0d436b73397ac988582d84
SHA51257defdf595a68ad8c7842f2f29d75c75c48f9c589ff490b3da444a288c1d19a79fcc635d9c398448fd4bea7ccadb7aa6e805e4b8c6d8c738572dc158f9a025d4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
905B
MD539edce4329dba9660def5f7eebc0597e
SHA1d43c0e000d9340b2d7024ae5859769ed0b03995a
SHA25604a3a222a8d6fe0d13dca9d48c39f09467d52770a4c8c40faeb43ea475043e29
SHA5122316aa5f2694bc2bdd28a7415d128453f1fa4f80ea306c209b7d21ba3b69828a5e277c5b63118e1154dab3caa8a05518e56320e889dfed05fa9cf5e725437277
-
Filesize
5KB
MD50b3a8040d16b54504b8768bf56fe5667
SHA10423490c4bc66891bf34906104166867c763ac5d
SHA256ab0242a66798de0ee329b8aaf945756d9cacbd68c4f31d119cdc8c76b2b197c0
SHA51230edff2e37593dfb072981f7c08d17aa059789b9437e4dbffd55433bfd00710b343237086781a55a03fb1c8be387dae44ff618ac9e023087766844cea56a338b
-
Filesize
6KB
MD541aecdce76b669972b0a520cf6ae2080
SHA13ae4eb2eadc50e240332794afbdc954d8bf4f634
SHA256553f04d55f5e172b0f05ff171cc8850cb5121514ffde2b5d81c7584f2b0a8538
SHA512cd6bb8dcfca8c0eb2afeb8397c7772a84592aa934b4d569607ec2c1e6e666de9d4658593402cafc156a656ee228d2238a9c90cc1b5a34621c707da75e5374856
-
Filesize
6KB
MD51816477aad705478018df5d3d674980b
SHA19a6483bf923f65bf473152e8fac481826272e46e
SHA256d966de6a3f4186c07c29ace1cfc8afa862a075727c4abc4824ceac6c7db3f3a8
SHA512f3749d630baa62130a25aebd0c9a630b64b72e636f039b8fc2589789028a6249e1449ad94792b51b66b78a73c6d2eca30cdb1af6fdc40851199218d1b1ec85f2
-
Filesize
6KB
MD5157db6c6155f917267cedc6f1def0d44
SHA10b8c38de7d3a8f5d12c1e112481d4511bc08dfe4
SHA2568138877bb56c0c46c1ad401662bfe2e7da8cd40c2d1b2c4810d76afa054770eb
SHA512151c08b26f34d0fd80b35f24ebf4edd46aa197520975fe76f743f0f4cae3cebba72766e7002005410d089536c293959d771b6eabcdbde40eebbac32250dd47dd
-
Filesize
6KB
MD5b160cd6c9e48ceb83f73e189f239e759
SHA15507a43adf21e953b02621d8d53ab7483c27bdd8
SHA256ebd6217facadb14a1ea20fe3c5c24e2a7fe1265ae7dcb8830e514362555509c6
SHA51206eb4181efaece20968967901d307f7e2c6c1d5cfef5cbbe95a3a435dede189a62bd5b034becd330530906cbf05639cec900cef4563bf928ca88dd29d862d80d
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57d3962aa2a58acd7eed5cdd698b98c9a
SHA1f20ec22e084fba630126401d936e119c5b1375c7
SHA256782cb7984b6f72742ee7b133ed96469d99320162e17a2a7827b848aad595c02a
SHA51239d572cf66ec9a8423957a20b2a3369714f855a408c79601b3639c3d4325af24725705af840ec3a662a3c8f5ddbb56ed40ea0d293e8f2a851480e66aa0fcdcae
-
Filesize
10KB
MD5f9b461d7fb011128674e54032d650270
SHA1ad0b43f7399864f081a03e21d8c85c27cb2e2558
SHA256f14a306d305187eeff3f8b470a6f6cda4b0c9754335e75a9109e9797d047d75c
SHA512e1d1e9ed2e157d056b922deda6c070b48b277b9a7b655713f62f9c750c4afb16c3a15851e6bcb49fc0274afc6ac49c4556e5ad96d5540433a3ac17666d0b8814
-
Filesize
12KB
MD56e93b483ff66497b2fec87b2dfcd88d7
SHA1f677a402becbb95583508178b9d7014c4802c919
SHA256d82b8498c52dc800d7a0bb508b26a7b2528dfa469d7d1e9db32193a5226a1d35
SHA51274f3a4eb395d7ceea4cc779914d76feaf272c064c85d802901c7b14e98d82ec9b497b8c25514db9f55dcd8a33838ab99caf0e641358a2f0ef4995966cb0ff646
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
644B
MD5c78e59c0b9136665d0d0cd403daaa383
SHA1e301158d67a5a57a574b921e7c34353b5ca7ea03
SHA256b540965daea3c0adc56914640cc74898d7d20fce874f2125a29d52f6f8716065
SHA51211fdd2e32c588f3f525de63aa524233ad12b1905c9191689f776ce484bfdcbf8852481d2651f57e2f6aaaf5f4aebfb605f4bfaf4272c8f353a1c6eba6f8de74f
-
Filesize
575B
MD59d3575058fcbdca2dfede9db288b521a
SHA1f9eb249ed81c393325cb6f6226e296c1059d41eb
SHA2560a0392113e6465066c71a13de4b01166567844ba4e5b0d61a879a41dc104f9ba
SHA512481d0f120b7db74f1685cf06e98be94f6dfa2bdb8f71a28f7f1c95a831ef04e2daa86148dd65ce39b3dd9e6222661d9cf672913b348ae4260b9ab71e6021ffc7
-
Filesize
718B
MD5c6fdf7cf312b39af4150e097eb01d47f
SHA160c9913e19ceb5ad773f1384d348fcec91d1379d
SHA2568bbcca6cabc4ddcd27ccab71560e03fe1f756a8a16c203fdb55538fc1ee17c2b
SHA512ee9763d537dbeb939b08030750bfce1b02b80e2cd049a2c4a74ce77b8b436431b3f61f26049ededcd5a25656a9b427b4c1c2b8af94de3e03b205847f07e5959b
-
Filesize
18B
MD57766463a2619648c9382e16f73d16274
SHA1446608611da68d6edee1561e055dde968167d7d3
SHA25613fa0e4a081cb65d8aa12d8dd046bb436063f992e5f5316fc5ba10fdfbd827de
SHA512fa3f0a36eb14354591268981cb29b088f9724c15dffc8328359ef07a748a8455bb21d2baa2e8644875fdd80ab0404e87a48879ef09240c3e9ce1a33685b1c092
-
Filesize
114KB
MD5b36aa86e52d9ffef6422650c45bfe2a5
SHA1ab512da2ac43623d58672d412430ef84de9e6560
SHA256e45046063ba11bd7ca361a1d553b11015031cbe9116c5087b8472533b7958a52
SHA512efaff991a6ad1cd2c05e3bcc923e0c448ff99a38e31ab307785e207539d10b52f212d960fbd5db0c1786bc14967a4d362e46c784fb4fc83956d10443359ba5b9
-
Filesize
114KB
MD5b36aa86e52d9ffef6422650c45bfe2a5
SHA1ab512da2ac43623d58672d412430ef84de9e6560
SHA256e45046063ba11bd7ca361a1d553b11015031cbe9116c5087b8472533b7958a52
SHA512efaff991a6ad1cd2c05e3bcc923e0c448ff99a38e31ab307785e207539d10b52f212d960fbd5db0c1786bc14967a4d362e46c784fb4fc83956d10443359ba5b9
-
Filesize
114KB
MD5b36aa86e52d9ffef6422650c45bfe2a5
SHA1ab512da2ac43623d58672d412430ef84de9e6560
SHA256e45046063ba11bd7ca361a1d553b11015031cbe9116c5087b8472533b7958a52
SHA512efaff991a6ad1cd2c05e3bcc923e0c448ff99a38e31ab307785e207539d10b52f212d960fbd5db0c1786bc14967a4d362e46c784fb4fc83956d10443359ba5b9
-
Filesize
114KB
MD52d7e48b48e9e196df70c4df3f9f14bad
SHA14c4626f20dccb7d8b78e55812da881533a4426ba
SHA256ca03450d46dd4337453f9bba40680ae1b5ee7e6c580dc68a8dacd7d481093aad
SHA51277c5e12cdc43dd4663c6bce31cd790203ac729abd2ad78778d79b7793b4f89ffdbe1dd2e28f4b80a17e208fed0c01330e657234cdd37536ef7b97b2b289b9451
-
Filesize
216KB
MD5cbe3c164dccd4f9d9ce2e26e911599ff
SHA1366d943cb922f33f45304bc081e9bc0268538f01
SHA256f8395b202eaa35bed4cf99b4dd5080b86fc4c7cb3ed8ddd9d958ea729c43956e
SHA5125d2af71a5cb2b05971d7513e66657d79f8ce006cd4ef74a842e0fa98c0d095f9bcc45ec77e9e710b78a5b98561150c3e0e46b74ec7bbf16379b20d67a8d233ca
-
Filesize
216KB
MD5cbe3c164dccd4f9d9ce2e26e911599ff
SHA1366d943cb922f33f45304bc081e9bc0268538f01
SHA256f8395b202eaa35bed4cf99b4dd5080b86fc4c7cb3ed8ddd9d958ea729c43956e
SHA5125d2af71a5cb2b05971d7513e66657d79f8ce006cd4ef74a842e0fa98c0d095f9bcc45ec77e9e710b78a5b98561150c3e0e46b74ec7bbf16379b20d67a8d233ca