Analysis
-
max time kernel
1196s -
max time network
1170s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 06:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1Fa0E3128_Fq0UTCtHmctLFYdK7BNsH0O
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1Fa0E3128_Fq0UTCtHmctLFYdK7BNsH0O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4032 popcapgame1.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 8 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlantsVsZombies.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language popcapgame1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{85048A7F-A9DC-450F-B7B2-CB01F30C4EF0} svchost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3528 msedge.exe 3528 msedge.exe 2568 identity_helper.exe 2568 identity_helper.exe 5236 msedge.exe 5236 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5924 PlantsVsZombies.exe 4032 popcapgame1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3476 3528 msedge.exe 84 PID 3528 wrote to memory of 3476 3528 msedge.exe 84 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3772 3528 msedge.exe 85 PID 3528 wrote to memory of 3776 3528 msedge.exe 86 PID 3528 wrote to memory of 3776 3528 msedge.exe 86 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87 PID 3528 wrote to memory of 2180 3528 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1Fa0E3128_Fq0UTCtHmctLFYdK7BNsH0O1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1fc146f8,0x7ffa1fc14708,0x7ffa1fc147182⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7929613930402604803,18395557186986394665,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3124
-
C:\Users\Admin\Desktop\PLANT2 V2 ZOMB132\PlantsVsZombies.exe"C:\Users\Admin\Desktop\PLANT2 V2 ZOMB132\PlantsVsZombies.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:5924 -
C:\ProgramData\PopCap Games\PlantsVsZombies\popcapgame1.exe"C:\ProgramData\PopCap Games\PlantsVsZombies\popcapgame1.exe" -changedir="C:\Users\Admin\Desktop\PLANT2 V2 ZOMB132\"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4032
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:6092
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5c8c722b3305d66077ca44dc48e239e99
SHA1d30a6b430dd04f8490a943c63c2db7e22f124277
SHA256946b66d262e306b0eb26c9c165cef853155d6fd8d911c152f2a0b75a81449fb4
SHA51242042db98197ec563a5315cdad900f832a087f37a4fff02f7c4f51cbc603f4b8e2e028cc0c9cc77df327cc2f6211da83b423cee0ed5a328e3a4370e9eda04c7d
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
107KB
MD580b2d6dc17f365342a447aa431c78e19
SHA1459a6fdbb7c98252933bc0dd27956417f4f91c67
SHA256b9129985bfb98b4175b841e7e471577b7578954f365bc8758996ded553b20415
SHA512d0e4495cf204f39b49527cc9f15f0983cd05ef3186f61da278fc1ebfe1d8123c0cd2c1b8ee64f2589ab8af440b030f12255c280b6b9a185b1514d6a97a32cd67
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD523e612ff1ef134a54b28c42be780445e
SHA1ba98edb0104b3793319264ca7a4ef04cfcfc9b14
SHA256d08298c30ff7091d1e84dbe3bca968d6d7edcbc22a858595fab257a898944cc7
SHA512af66cba99d39e619f904c79d800ccb81926031b9c2574b4ce8cbc7d6e2de70a52a3f67471cc3b96cf3356f1002bb75382a99ee382636e78fcd56840ec0485479
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50ff015aa2a06d15791f0d062b67aaef0
SHA14c779501272c3fca22ae3779a0bdfc735e985440
SHA256e186505fe84ed7aadd5917db2c610073d26ce45e20d222d8d9f9afa30334162d
SHA51202fbe174612e150e762a1aad11d920e94d3ca9d2bf43fc43cd921370316ad8852acb4a7f0e8e47e955f851b06b8fba1c814e372e7191ee9e4c38335880e0b944
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56216f85f74bdfb7429036ba3bffa78d5
SHA187f835d7ed261f29df413fbc24070e432b64715c
SHA2561c4674650d3da696397ae197d5e09417888f89ec716841dd793e2c3e6ab4611d
SHA51230ebd2f73adb39245f231ccf3d2f628c549d77b9229cc7e84ffd65a811198f80b6614650bc35de1b9b4c5f4e5e1817b46176f9284b27f05d28cf7469c7c0ce34
-
Filesize
3KB
MD554a9e47357d898dfa70afd7989e3d8b4
SHA1597b8e4d48bba370d717c26731ec2b87189b0445
SHA25628d21dbec54cea08ad286ec90bfea642aa95dab3e3c75b3f5fb3d26e3cac5a4f
SHA512385c7b3c1dd4475638339c075b8b9c8efc228abfe6ca3b3f647ff776c4827d03c99867537a7f6c4c0aca1393da24b1097b6e91c10bfff1684f6e86ac93bed73d
-
Filesize
4KB
MD586473494bed0b5c113571fca294aa24a
SHA1379b6a07acec38a46c4bf8c78207148a333e9198
SHA256c29718216c658d0a3dccc888a1aca294280d459a7f96987efcf9fdf0fa3a9972
SHA512953e8b7a9677e7df11de9f5c6a7522dcec9eda9588e6abff8c813e08ad364afedbd8370fb6ad8dc031deee666417c473d4d1b63d0a09f4e8b07a774039549b7a
-
Filesize
4KB
MD572a4ed72805c6719fdcb3d6d735dd9b3
SHA116d609ec727a846a7ff0d56f317c9b7dd03a1306
SHA256e367a3e92bdaf04ce622a018a05d14063a2736a42ed86663d4ea5e42797b3669
SHA5120494a6f7ec19da9714c1e0112d9d52085e3fe952c9c5391a52bb6128aea371e12770368baa9e95d6a251e35297591650837bfd17088c0cc5dbe6693c0232a90e
-
Filesize
4KB
MD5bde25f861524c30008b2c5b2c11b77ca
SHA1a80757ee854151c0052db4731d54c0be072a3418
SHA25689c4f1676122f3626fbf25056692acb151a8906d4eadd368e70693314f87d208
SHA51202d23e30728ee0c146d051e9ddac95176a48c94ca69a769d616f1ae616562d825d840ce152be44c786c89e54285ad20fa14db543bcc16418138c2b77e5c5cb69
-
Filesize
4KB
MD5ec4e33af3042cc80d7ab9d6d771ea487
SHA1d74650d99c80b6fe585b40b7eeb5a3e42eea87e0
SHA256ea3fdd4f286455ae9a9917236ffb0a834a27fe6e3377862e2438924abe67f3c9
SHA5121aa68e8339a2a46b8bfc758d05ea737eb557fbe25a67d8c801e0e8cd4fde955a683fec1e63285b7f147730101acadee8f5191d7614a92d64506eef11542f09cf
-
Filesize
4KB
MD5df03697dd9297bc9eb1dae14ad60ea19
SHA1a10554c813b857e2ecba09bb209f519e19fe18d6
SHA2560058e6d56a1710f38907629cccc34220fcac7770d243240bb2b1d616d022d9eb
SHA512d57414921c373a59a72559a17b47b592095ed614ef3fe23decda9fde0348c7b78957c34f2679366c7fccb8204b3703b820c54d9d9b6a7a8ef1305c9cff3eb1bb
-
Filesize
4KB
MD52280c4b579014dfaee9e0a788c44c9b0
SHA1ae4e159378d7089f9863f5df6e572d8b64ebb80d
SHA2567a4a8d0901dea4155d434848205d661e2fec1fb59b9a34c2c5d2bd27a038e09f
SHA5121a4fc3e0c1b511d78c74df18267bb351d9c96bccdce64558938514e8c4ac851bfa5fa092fa3b13fd60a00aa772a81b94c89710239cdc55645d55cee055497465
-
Filesize
4KB
MD5316481c2a316b2651929bc2ccb45d50c
SHA136205fc7102931565fc1020d6c06dbdb7a7111f2
SHA256989837be873355d521f220212019789cf0f2e5b408e947bb9ca8fcd3edee26bc
SHA5125dcad27b6827380bf6ff2d064dc2c378dabb20cb7aff85a9ea760e6fe14ba5b642bed1fbf57eaae22b9a95a93b8b0392f4094dd3c68b89650b6359f16c4470b0
-
Filesize
4KB
MD5d88dd849243a9bb3b2ec76f151108bfb
SHA1107ada73149591f1f634be57748045a147a43e0e
SHA25678bc354ee84d5cdf0f1ab50d4072885dc46f190deffb3df3cb01fab6a029d542
SHA5121e13bdfdb76ea152e446de01f70612e85a1be87544edb025afb6017be40dee678e50a080f8f5c1688c15d3a60b8366196a19aed8601e5f3b231ef6873366413d
-
Filesize
4KB
MD5e0737e857c86abbf2b1d9d600aaf37f5
SHA1a5f52b808a66aa8851c00053f5de738c6d9f593c
SHA256e26f2c541e2e1320628b4937bd5574422e1fcbdcae61245cf0a4c482558ecd33
SHA512ea840dcf6c3d01ba0dc9698a4d37633c0ab8efca0c5d48847773258c5fafaa4997b211df1700de7c3169c96c91fe03aeb81ada54e5cd33ca1dced8ced25da233
-
Filesize
4KB
MD5e9ed0dcb90a506a8ec3a6b6ddf906e7a
SHA15dd69308baf0f1bac29601e75a79f0acca4d9284
SHA256a36efb775579abbd924dd9d4e356562b2178e178b2f001e4edd163b4cee707d9
SHA512225daed57b27637e5908af77525fab67f7e5b2949430fa0e6ee64a15fc7747cb6ae1e544f060930edc01af20fd5e7f82273572eb2f87fb04c798637053792431
-
Filesize
5KB
MD5d0688a44ee2c9d784976bcaa3a3f69e3
SHA111f6885a25865416d61b6ffa4b1fa3683ac8bd12
SHA256dd2ccbd2be6e311a1a32527d678ccb537ed266cd9fa1fe88c6ebb1a45608064e
SHA512dd6dec6e0f802790c5500410bcf7e80fb4f390b752d680d106ba1b045759d115a5438156d362ad2f8eee8fa60c44e4a2ae180d08128c0a1aaaf4757e1f722214
-
Filesize
6KB
MD574c637964970867065f606ba5ad476b0
SHA13346250be488a0b9b90c94d3a40c5480cd09ded5
SHA256932c5cf7151b80be594d6e367605a756063692b3fab0e1750533c86dea36a0e0
SHA512400226356f5ce6c043d07d56efd595571104ebd4d33774e05ed189272bea96800de70980c51b3fba42dcb32ad55cfecbbbd3b97192e646ac7859bccb8fa18997
-
Filesize
6KB
MD599c0fc18e774028ef86a2c04b983e2ae
SHA18f1f0a1728fa432982690be26e2535f54fe098a4
SHA256694efd88ca46c343ea9a0ccfe9862d81f0ce94b0e1e0bc8d2738cd9bb1f2ee1c
SHA512a194c505bbc91c9ae5f6bf23d7e1aeca7f8147e5c47872fbf737ed54b03682d9be6bf351ab6935103729037f5840176f8d3cd98e5f09e56e40c4e23a867c68d5
-
Filesize
6KB
MD521b6f60e719e341048ddb28f60ccf8af
SHA14ae1eddef15da0120e9e86f3c8d226f7f7d9b835
SHA256f4afeefb76c4ff1c1ad2336fba15d79060dadf4d0bb1f91ec7edb49ebd4a708a
SHA51217a4aea11b6c892e7ec9a18af54ca86b546c325394a4628ab6ee6a1bf98e93d752a68e00dfef5bc975c91a50de145199e2983ee2c3c1f0eb8f0c5ebf0cdb933d
-
Filesize
6KB
MD544fbf2c8d893fd125f625241e98d3379
SHA14ecc6f547af98270a2ab9e18f73cd9068f63c599
SHA2564e07238448f11b21a4f79a5d2120a87a0a188fb4efbd93cb9e66ce3a4c138bcd
SHA512aa8f7e7c2b311e0e8f554b16558f14140968a70bf2bde272ab4cdb61349de867a1c090ebad2efffeee53ff9a2e1cfa535a37bcdf95a24da3aad4c0cf866ee496
-
Filesize
1KB
MD5e4c4773007dfa1e726f624f89e2087d0
SHA189ee465e1538e26fb9d55947793e2f4f1463544d
SHA256d13562ee85f8580f161f6e1369f47e1d5b109dc14629000ec0226dd93b71d71c
SHA5121c466aa88caf81ba40b53ac9157ed7130de3fcd2da28cd15e118fadce322f67823bde98b682b73d246b3da9af271666e6937c505bb3f7441558c8bf2749fb288
-
Filesize
1KB
MD5ef89714f21f32dd816e131258f4cc079
SHA13674c91cafed6066b241ee61936b7e669ef21cee
SHA2561ef0d0e24768aa66753bd8918d214e8885d397d7806a11887d39c14d2e54607c
SHA5124297f8c6be0276b7649c288e1714d6a3a2aa9831ac4af6fff8659906af56df26780379f17a3e221b9b48b14fabfac3b3236efccfe3c7d719a77d4d5d81d9fe4b
-
Filesize
1KB
MD55b156e9e6d6f672bd5ba380e87e4fa28
SHA1d86a3f2d207d205f7a3260299f2315ce18ec4119
SHA256cdd322c850eb5a965ca2bb730adb51badcbf5e7129529e9630730810831d78e1
SHA5124fafa79374b93ec8c76f510230db3f796c7defc5f95da685742429dc4eafb622586e27798634ba60fbff217bd9989ee688a3661adee17b1a52e957a721f82bf8
-
Filesize
1KB
MD5472df66160d6ebfbc987f58af9a6e718
SHA12a2a7cb8da0e1b4ba2c6c96659b234ee924b3d9c
SHA2567cd59876a019dc02a4fc166555a4ffe3d330aa0e44c21e290be0a1d722088100
SHA5123b041ac42c7d1067c956641aa92c84563773b87e2086cd8bb1d08ca7ee52af0355f11808bac22832e2516aef24f829f68923d5e9309bf4d4c7a5b126bea5563a
-
Filesize
1KB
MD5f7fba3eda580b712c41e48b1c76b735a
SHA1141ba7cb56cdd1bc3d5c7424302ec741c8509759
SHA2564c817c9620ae00cf613b5996bae26437b5eecd606c221ebc025d95611d7ee321
SHA512c7da01d4f688433fe56dddbcfedb3e806c7c63f5e896933e40b82e664e83d0979c44f4ee7fd8e75c5ccf83c949e031173fb56a2abec719a935190277db251995
-
Filesize
1KB
MD5ce31aab511d19932fe649f09a376fb4f
SHA1903057e1b10c0b65a2a96f4f13e21db52991d7d0
SHA2562fb5d947ab2d470cf642ad776c250d5fe61cf2e2eb296aea71b81b557aca33f0
SHA512d71ee440aae35661dd73b19d6a5c60dc54fcb2f7fbc6fb3d42d8de3f6ceb2a5c2f94fb4d93aabdd3ed2015eaf83a0584a674711a3041a2780d192f3a45c34c3a
-
Filesize
1KB
MD5844b0a877c4f3eff3db31d5f191d38f3
SHA1d84e864a4769fcf4f992a6f2209bc86ffcd98827
SHA256e43544d218d23c176fda05210de6721a2ce87428b27cfb8d84f40532d3d62656
SHA512360a327dd1c4d1edca3649f5c5a75da87e0a487b907408940587504a65f5ad16fd139ce2ae168bf5a4a369abec0ace6e09265084767d8ce1845da762b734182e
-
Filesize
874B
MD50f6764794c83ee5b007d19f034b9df83
SHA1206ce0b4cb06e5acb0a494419e00ca612c25f48d
SHA25690df2c2c002b191862383e4d471cbf5819ba5cf97d40c80ac4035d07f32925fe
SHA5126d776dac1fd1d09b5e9598f6bfd63b59bfd4f3ce6bc518636eba5bd44ccdfd46e5b2d4a3d62f4359e4a67f2d1ab611370a3ccdec196b068965f87ed58a8d0c31
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD523085eabc776c97f355786f78d140eeb
SHA1d12919a7572e07ec8e91aa9f2e4ea8b052cdf7cd
SHA256f959cbf00e3ddbb320f20e50dcf2551d1195da04fd6270593ccaddb772b504d6
SHA512a9e51f9aebba1fbc8dd01216d27818b3b626dede81b6dd769dee6be1825a9e7bfad2103b8184f8d880cdb8601997f7513a64de7dc138c430bbd004b89cb6cd01
-
Filesize
12KB
MD555157708cc2e3ce6fb26620c4a034226
SHA1e4910d1e5e20e3590a8509bc8693c10ca0f5a176
SHA256d07b1810a0d2be2f473119e0d332158d42af60276f3e4e673be6fe643ab99d53
SHA512945ea9bd329443ab326f58b8b052c2c775bdcc30a4d7661d625edf03fe2846d09a0010b3571f92aa4beed0c7bff5e2aabea11a65e585cd95349ab619d30c2c67
-
Filesize
12KB
MD5b6ba2b0189440896869e31dd2481934a
SHA1d051f674e3660887ba64c1cc1194e7a2a6b2526b
SHA256a457f514654151b9043037bb9fd0161a6fc4a786d02b9371233e7faeab44513f
SHA512c2672fd235e5e874a9cdb9dda0f3cd768a27d38b615072ac31c7b993ec0d2663a0811131bc17774c847d264e3dee3f66903eda0ff562f796c39bfdbc4bc016c5
-
Filesize
49.1MB
MD50f65de87a4b35cce577cc5383a3a95ad
SHA1b800546d4e2f137f20d273b355c92199ac487025
SHA2564dfa7271e72b650d9602a8adc3810c7b7ce7dbabf3fe1d6ac8af5ac3eebb9cb7
SHA512c9cf8b3bc9aaf1d51f80fba782e738a7a6c4e6dd217e61818b0ed7ed9605fa46b39dacf2b87d0b3cc06723d9073900cb84e239854890e5e69e6fbadac078ea85
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c