Analysis
-
max time kernel
63s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 09:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gamejolt.com/games/Minecraft-error437/820015
Resource
win10v2004-20240226-en
General
-
Target
https://gamejolt.com/games/Minecraft-error437/820015
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 6616 icacls.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4460 msedge.exe 4460 msedge.exe 912 identity_helper.exe 912 identity_helper.exe 5784 msedge.exe 6212 msedge.exe 6212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5488 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5488 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1356 4460 msedge.exe 88 PID 4460 wrote to memory of 1356 4460 msedge.exe 88 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4544 4460 msedge.exe 89 PID 4460 wrote to memory of 4524 4460 msedge.exe 90 PID 4460 wrote to memory of 4524 4460 msedge.exe 90 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91 PID 4460 wrote to memory of 3548 4460 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gamejolt.com/games/Minecraft-error437/8200151⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd661146f8,0x7ffd66114708,0x7ffd661147182⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:12⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7080 /prefetch:82⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7076 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,12178419304019319496,13000424165389293887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x428 0x4e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:5488
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6756
-
C:\Users\Admin\AppData\Local\Temp\Temp1_error437.exe2.zip\minecraft.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_error437.exe2.zip\minecraft.exe"1⤵PID:6912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c javaw -Dhttp.proxyHost=betacraft.pl -jar natives/error437.dll2⤵PID:6220
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exejavaw -Dhttp.proxyHost=betacraft.pl -jar natives/error437.dll3⤵PID:6240
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M4⤵
- Modifies file permissions
PID:6616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
50KB
MD574f713db1ef9a3cbd92cb4b6a6aebd6a
SHA1d8f91bb41774f518a49da8511e55a93a16dfb768
SHA256c1f4b6fb912df84ea97ce713efa55ac2801427194805c71fdb5cac60d3010b1d
SHA512ebf88643500414c1b5deefb197bb35278229ca257bed288cb85b131c8b3a387e70a09e3f2eef835a86af6d2abedd703ee12fa7450549391e48a52158f442a484
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5db004df8e85876d5392379dc7ee408c3
SHA1b342af8b0c19d30ff03b049f42737c8d4b5c7890
SHA256f51b09695a6b818ba70672656d53eed1184b490cf5622626b4fa7016f4a9d112
SHA512568fff0a60cf5fc1a252b081f6003df92ec2bf3f717e82544c543d49ff4fc8fdc5e626f0d2bb39a6d4995b9dd637633b218245a11c027c6c27d9392bc7ab2194
-
Filesize
6KB
MD54557c81204344afd1f5f653460ee40ae
SHA1d12763ce37c05691f02a7d8caee406c8fae3f758
SHA256c52419bb7d82932708f217cc3e1dde321f1693f3317ebcd3c1ed5aaaba497050
SHA51205a8af90abbb0b7df9ec3456bd33ea26d62bd6779131c0ca92b048e5ab01a3aeb260f05ff0380fba9713ee0b0cb03fa3ab891d392f2fc089eae5b477ece72235
-
Filesize
9KB
MD5c3d0d59c7e4f34614bee58ba1aeaa672
SHA1b979a370311db3d04e0a33271761a5c02bd716fb
SHA256ed5a11e604f8bb32064447ff9c529145ed7f33213574e6d7cfea2b31a5554cca
SHA512be1cbb6facd8ffe88796e144918faafde02f8d9bdca4f19e5b830fec500b410021b90ea680950633a5e998cb07c3d36bbb72fefc16f52b3db31d46c43ff1ebac
-
Filesize
7KB
MD5259133f6d5f92704e1be7eeb242105c8
SHA157acefdcfe3d8f4fb1765cd7a3100bc4024b689e
SHA256b96c23972e0fd671744a8df44961b76e9efcc8b87abde71499c51955659261d8
SHA512e52c5922a2f98d1597ebc87e00f43585f43e1d3f6cdc669c3f3dbce08419dcd0e6e225285b120252a388598c21b7dca073d0b50456a4195aff45aec2b6378a68
-
Filesize
14KB
MD57321c73ee30b5168c8a5fffaa7235a1b
SHA1dafd13bb6df5fcf0f0b8288e6f4b1ffec9633ccc
SHA256dd47e653a157a3d9ee3918526c34c1a2d1637dea55660ecb22fe1fc7e55d4b67
SHA5125408e269777b9713f86d71886a5fb1ca639b287bd5ba7cef4b8b4d4ec4d80f56355b46a0b9781ab4a41d81393e30b6932e843e154587cd4362fc60af4afbad75
-
Filesize
1KB
MD5948bb4540e518e38fc50d39b69a2f6c1
SHA1c7138bfe4135894fa6c97ebf636a45c9940b7ee3
SHA256070559ef8c1ce1917648cc0ef38fc7aea758d7119c98bbc3be48aebcba22185a
SHA5129a7a25d5660b2dc7de597e0d9e7fbe0783eaafc3d2745315ed64345bb4eabb9b3fb438a8670cd7167167d96ee4d6cbbc1e13e3e2314749961bdc6611f5f787f4
-
Filesize
1KB
MD50d9edb3559618c2f7b3703273e5bcce0
SHA150b17acda8171f937c111e47da6d3246c990aaa1
SHA2569b31b5aff85658962db38a56266d5e9a3fd6bd030c18ff9bfea6b2376832a979
SHA51231c4eca1be9a2fdd5e8f2bc1ea9d36f18a90bfae7b9e9066678efb60811b97f5b8c811f72f96dc80587ff4f227b545f4dc2357f4cec4d9e34a36eed7634ef030
-
Filesize
1KB
MD593e7c50544e2beb8365b28b3ec93e09f
SHA17ca8d3fc29c22edcddaab6f27879a25b0ac2b79b
SHA256584dfde70d3ba367202d07efebcc49ba972507b9e08f8e2c2911dfbe0411b8d6
SHA5127b634a61ab3009ef41ddc6fe1b3cb6762670719d2f8864f3eff5ee2150d820a2df7e8f135b7387ae764b814e8105ba8e8644b1ea1ebc42935990ebb566927454
-
Filesize
537B
MD509d32684cb067a703a8158d5755530d0
SHA1fbda18d36dcf4cae1b29a837f8b346f267dbf9fd
SHA256cc6022d725b0d611c5e532d8f487383439dedbbe6447db6b0b8925e86cb27a5b
SHA512973898e7f41bd6f7a262b4847ea6d6043f5b448d3231ef881a58f8b14a78e7a5b3a271943faa59d6871e28fdb83baaadf88b7032ed68462991a16dc667795c74
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515752864e7cb5f090a4191f732b9afbf
SHA1f5514e043ae76f103ca1f266802eb978d4eb9bab
SHA25657e8c18bedf0a30ddee8236fcd526a9c8c8652dc58086ed6a26c6cec561d3120
SHA512de8d32a6aa61c319e38e794362430e8e4f03b207043c19e4dc308073b8036621cc6afb42752b1c23a8acacbe856bad037f78319465aa742c3a6e10e93f09d56e
-
Filesize
1.2MB
MD5cba43c95cf683b9e2418185e3382940f
SHA16fbe5ebe97de4a686a49824526b1ad4bec4e1fbc
SHA2569a733f96dd94f617268460e84bdf902cc8ad8bc509816f47b66876165d424fe0
SHA512a11a2f372b2429c9887b68529f3ea9af4d0b028aaacd762b0c0d8762255f090e906f8a1ade6da97012a3b73477cb81d584a5981012036f48bb5a83553595bd10
-
Filesize
1.5MB
MD5c263c94ad43bc0b35ebe1fbcd7984a05
SHA1f082dbccd96f5badb96f28fadac5b43280f1eaed
SHA25686a1c31fa184b3088e60c1f7af7e6a614b090cbc1c4483bdfc0f898465b805f2
SHA512dac297d6f16e461f1dea9794620ee43be454781596d4c2af7e79555f9b54a48570bc12174402f61316860e8054f3532cb0c6a8e587b181c5827e81932ff6b32e