Analysis

  • max time kernel
    124s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 18:11

General

  • Target

    https://drive.google.com/file/d/127KOWlURddQ7zLw36xF6hyG-OvojxpIG/view

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 23 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 63 IoCs
  • Suspicious use of SetWindowsHookEx 41 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/127KOWlURddQ7zLw36xF6hyG-OvojxpIG/view
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd70846f8,0x7ffcd7084708,0x7ffcd7084718
      2⤵
        PID:4796
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2392 /prefetch:2
        2⤵
          PID:2916
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1696
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
          2⤵
            PID:2032
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
            2⤵
              PID:5068
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
              2⤵
                PID:244
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                2⤵
                  PID:4524
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
                  2⤵
                    PID:2832
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4784
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
                    2⤵
                      PID:1228
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                      2⤵
                        PID:4048
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                        2⤵
                          PID:1604
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                          2⤵
                            PID:1176
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                            2⤵
                              PID:1316
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6044 /prefetch:8
                              2⤵
                                PID:4056
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:1
                                2⤵
                                  PID:740
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1096
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:1
                                  2⤵
                                    PID:5476
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                                    2⤵
                                      PID:5484
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:1
                                      2⤵
                                        PID:5636
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:1
                                        2⤵
                                          PID:5772
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:1
                                          2⤵
                                            PID:5780
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:1
                                            2⤵
                                              PID:5972
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:1
                                              2⤵
                                                PID:3464
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:1
                                                2⤵
                                                  PID:4268
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:1
                                                  2⤵
                                                    PID:1712
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:1
                                                    2⤵
                                                      PID:2424
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5216 /prefetch:8
                                                      2⤵
                                                        PID:1648
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6676 /prefetch:8
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5796
                                                      • C:\Users\Admin\Downloads\7z2408-x64.exe
                                                        "C:\Users\Admin\Downloads\7z2408-x64.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:6056
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                                                        2⤵
                                                          PID:5176
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5884 /prefetch:8
                                                          2⤵
                                                            PID:5680
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6996 /prefetch:8
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5600
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:1
                                                            2⤵
                                                              PID:2796
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7268 /prefetch:1
                                                              2⤵
                                                                PID:5244
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                                                                2⤵
                                                                  PID:4084
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7812 /prefetch:8
                                                                  2⤵
                                                                    PID:4224
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,15675136200594529136,6586256766557894146,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:2
                                                                    2⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:808
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:404
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:228
                                                                    • C:\Windows\system32\OpenWith.exe
                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                      1⤵
                                                                      • Modifies registry class
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:5196
                                                                    • C:\Windows\system32\OpenWith.exe
                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                      1⤵
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4888
                                                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\PvZ GOTY Version (v.1.2.0.1073).rar"
                                                                        2⤵
                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1096

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      6960857d16aadfa79d36df8ebbf0e423

                                                                      SHA1

                                                                      e1db43bd478274366621a8c6497e270d46c6ed4f

                                                                      SHA256

                                                                      f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                                                      SHA512

                                                                      6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      f426165d1e5f7df1b7a3758c306cd4ae

                                                                      SHA1

                                                                      59ef728fbbb5c4197600f61daec48556fec651c1

                                                                      SHA256

                                                                      b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                                                      SHA512

                                                                      8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      c080cdaa5e9fc9bcdc82d9b64f806de1

                                                                      SHA1

                                                                      4541895f16c25e07f3936c688329f0d97216f7ed

                                                                      SHA256

                                                                      b390ca687e8f6c18917e134521046c34ffc5b7cd996b0c69243513c9a89026ce

                                                                      SHA512

                                                                      1b0a70fb7c81df593bdce74e4df37a05a49fc41944baa7a9d12985d67e26be387fbce754e8f205411509b4439dde12b9d95c686adb25bbf69da0ad3d81d33d55

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      360B

                                                                      MD5

                                                                      8d8c9c8a0744937a92cdd2a754f96389

                                                                      SHA1

                                                                      efa7eced011c7f13eaefd79593244a61d1ef2a9b

                                                                      SHA256

                                                                      917bd78cb999e9a14cea4dd668ab6f521dd12264a3dc1708c9fa07924c839e7c

                                                                      SHA512

                                                                      6c72f5c7065f33e258e9dd21a92da8720f8d78a818905654460175416dbba004609c2ef9f7c62681925586a8c298b41d0bcd71203e22ed5994c517717ee280cb

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                      Filesize

                                                                      3KB

                                                                      MD5

                                                                      1b7326c7fe10e7044c63a2edfed005c0

                                                                      SHA1

                                                                      dc5d5bb05d2056e26925383765dcfd7ff4b2567f

                                                                      SHA256

                                                                      30870ddb3de0e42ee37a5a3798e446361587ade88660a8a8f369f91a56c3ec48

                                                                      SHA512

                                                                      172ec3c7680c174211b28483d7389ffd21153b4107522e37884eab50c402ee8819c48e2848e2f59d5b69739dd733a0fdd0b5da09c765b55308e0483eb3abe81f

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      69106709f0acbe08939ae5f4ca10ef3c

                                                                      SHA1

                                                                      92f406a5ed645c66512f80d84edcb58fcea9459c

                                                                      SHA256

                                                                      cd0cc278fe672fe0162bb5216b349ab2b583606029ba369ba5ea68fafaf5027f

                                                                      SHA512

                                                                      64fa2bb98edd68cddf00389e1b046525ec950abf06572b7c8a8539656e1630b2f6f174601e8389e40580fea106b4f16456f535da2082f8af8f3141722d9b17b3

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      9a6a9607b2d001a649aa67ef12439461

                                                                      SHA1

                                                                      03caef8364d1ca0db73e99f136eec23daa8c999a

                                                                      SHA256

                                                                      7b1d80bc4ad6a9a36bf3fac3842ed8976e0eefebf9d31c5ad8d7475b5a2de60c

                                                                      SHA512

                                                                      d1e49238378339f2fcc33a60611cb3e69d0b536cd58a59d0dc7903a6a7807d732d1ad6662699bc340239eeb2523c2ae47b48fe19a1c2525f0e8faf3d5eb92319

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      018f0fd47f46f5e1401d8e2d7b17f7f0

                                                                      SHA1

                                                                      0ae76ea4e3d6da9e2c11db71899e8af1d2e0553b

                                                                      SHA256

                                                                      41f70c4269e8afeb415b1d9fe328c310421e3777588908ae14745efba7758c40

                                                                      SHA512

                                                                      50f48a8c4be949161c166265b533fb56a41cc4c14aeb2bfdbe197702f4fcc061322fd20123f2e320c998a3b45ff5a21d817998c9deda31d04060142d14591c15

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      654aeb6e284c5e257d4abeb70bad3ea9

                                                                      SHA1

                                                                      bf81304e155f0eac5f105c61c3ee13226a40f017

                                                                      SHA256

                                                                      93622d99d2ca4664bb78b0aa8247da4a5c3b8051996547792f2f1a62339b1018

                                                                      SHA512

                                                                      4d16e962f1701bf1899342d278ffb0a16da5bbd47c559388a1c31dcc91bc3dd65695523cda562da10c57134279511a41cfc45d1de1efcee0c13ae961bf10c4e4

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      8c277afe935bf2f7438c035ac72cdf77

                                                                      SHA1

                                                                      ffdcbe6e6cfc1d14e1fd7e4ecda2e1b073fb8be6

                                                                      SHA256

                                                                      44b3846ce5919bbc00706d2251d696e8541279aa714495ccaa0169b11a1274dc

                                                                      SHA512

                                                                      e946664b78b000db6d68905093ec3fbe3dae340bf9f873ba14f7e19699fb7bd083b6cd48c5ae987d812e77ca4cdc80cbd85bb2946700780d477a6f1943422033

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      d2c84850a919847eef6f145053d49ad3

                                                                      SHA1

                                                                      dc59ca17d1440a46efb4ed72ee417018ae9c1e42

                                                                      SHA256

                                                                      6fc798747cc07dae4dad4fbbc8a4298424a6e849aafdc44355e1a7b7c4fffd00

                                                                      SHA512

                                                                      0f66254299a3f70eee314364596222f7f39a04b9d339fc05d36123d75456e65babaf240295a07d6c0a244e2d0f18bd1a3edeafd408575401578a04b2bf3dc9fc

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      f2ade0f8a99bd2359b50da8a2d104406

                                                                      SHA1

                                                                      81d38d1dd1694599786d37eb4cfaa195cf45cd48

                                                                      SHA256

                                                                      ed6877c157944a9be59d7aeed10eaba28ac857c758b4e190225ae89713d67b89

                                                                      SHA512

                                                                      79406fc114ca15deed456ccea85b9b22f0d7eff903dcf5985636c95e56529d7ff9ac7322892bac65371b304f3e050f5bae634fc5748a3726d29aa3633caa2273

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe585975.TMP

                                                                      Filesize

                                                                      873B

                                                                      MD5

                                                                      e1ad0b10c5bc978cb51a0eb97a240d09

                                                                      SHA1

                                                                      8cefc3b6b923c513c6d9414d4e8fbd3e718a2d1d

                                                                      SHA256

                                                                      8e19c796f7b202f44be83d4bba4c1d0b08c1b36d664e847ad77c8fd49dab4f91

                                                                      SHA512

                                                                      08425516de66e122aff92ba524964befc56c11307ca49d88967fe8c4149263bc7df69ce2d6920d3a43ccdd195d357e9734ebad594af735accb685f5adbe3ee93

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                      SHA1

                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                      SHA256

                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                      SHA512

                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      0bba299d45cf1743a710079ce8678cc4

                                                                      SHA1

                                                                      e67b7686f80e93b2da7ecf276266e6c461e25212

                                                                      SHA256

                                                                      4178ab4d3469ce2ac3c15da5cf72099a8ff2c1acd8aedc6308f879fdb230292f

                                                                      SHA512

                                                                      b77fb9c57fd0ebf83fb60b984edf668c609115bd42abafe30ae2bc418928b566025f768e733a23d68a6e12b9c318193d48a812aa8f563009312c1af4cf7e0f96

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      5b2aac15b38a32a3a03552c6da66cd10

                                                                      SHA1

                                                                      82a177520eb4fdd4a42fa1c69255584bcd5597da

                                                                      SHA256

                                                                      ca2bdeff8b404b7cec1bc78e1862b1224ccecea23effa0c095a75f20acf3dc33

                                                                      SHA512

                                                                      9f1328cd29ade30cacafa5134b624c5bd6e20eeeb2ea9c5da19ad9469f71214a82896a391f84321d83671cd14410bdd1667890f27176db939f6da0c375f6e9e4

                                                                    • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                                                                      Filesize

                                                                      344B

                                                                      MD5

                                                                      e77038a77a63103b9df9ba47f942388d

                                                                      SHA1

                                                                      a6e8ba56eff695045ccea9e36ce0943ae004d5f1

                                                                      SHA256

                                                                      385c43085d4b573dffa20af54ec1c99d3506f13629cc732ee44e947df85b68fb

                                                                      SHA512

                                                                      6cd1edbd69acc2d37aa859c67875ada0d55802314e746a7d9c80ff24e6ef5f77fea60027bc687b505fd094e3caba01dce30cd7cbdcd79562675241f1595c8330

                                                                    • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.lock

                                                                      Filesize

                                                                      18B

                                                                      MD5

                                                                      bbd418df3fc0e8f8380bcc252a2cd266

                                                                      SHA1

                                                                      ad73b0c37c3b1cb51210af6c4b2bf3ca2ead59bf

                                                                      SHA256

                                                                      ce2a0a8a7dc3d75b97131bc0614843a6c787cf891674ca1cf9c09e534dcb2663

                                                                      SHA512

                                                                      087e824354be78ab027495304d1643edc32af54007d0c34932cd763ff7f073b3a73802e21f759184af33ba02371329d4a13003ab97031c6d74b1c45dbf788ba9

                                                                    • C:\Users\Admin\Downloads\PvZ GOTY Version (v.1.2.0.1073).rar

                                                                      Filesize

                                                                      36.6MB

                                                                      MD5

                                                                      1aab13729e9e37d6985822e09afcc89b

                                                                      SHA1

                                                                      05319245c64948ac6f3542a3280683193e3a15bb

                                                                      SHA256

                                                                      30a4e9e9770b4445b7d0d621f55056483de58363a1ffa95955da359f0b90e73e

                                                                      SHA512

                                                                      71322f1295e8a86531e33c935bb2524219cce741b275802941b4518d7f3a437e40b05bf0829aca2990253c5bc97410d995e8f79fac7197dc5e97a1b1a212861f

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 305378.crdownload

                                                                      Filesize

                                                                      1.5MB

                                                                      MD5

                                                                      0330d0bd7341a9afe5b6d161b1ff4aa1

                                                                      SHA1

                                                                      86918e72f2e43c9c664c246e62b41452d662fbf3

                                                                      SHA256

                                                                      67cb9d3452c9dd974b04f4a5fd842dbcba8184f2344ff72e3662d7cdb68b099b

                                                                      SHA512

                                                                      850382414d9d33eab134f8bd89dc99759f8d0459b7ad48bd9588405a3705aeb2cd727898529e3f71d9776a42e141c717e844e0b5c358818bbeac01d096907ad1

                                                                    • C:\Users\Admin\Downloads\Unconfirmed 592516.crdownload

                                                                      Filesize

                                                                      1.5MB

                                                                      MD5

                                                                      2c317cabfdfe70587967ff6f11ced34f

                                                                      SHA1

                                                                      8000230ed4f382e25c424918858be1de88b13067

                                                                      SHA256

                                                                      52d721a9a346bd25e055a54c11f06668b1876a6e0be2c7a08a8e5b854bf75c68

                                                                      SHA512

                                                                      30537d4e2a334f5fb05cfc54df59ec31ade01dc23da0828908374bf0495e9b1624c50f3332799d6f1769b3269b4777f5ef82ba66e251bff9a4a8a3d6c9d3352c

                                                                    • memory/1096-647-0x00007FFCDAB10000-0x00007FFCDAB44000-memory.dmp

                                                                      Filesize

                                                                      208KB

                                                                    • memory/1096-646-0x00007FF637B40000-0x00007FF637C38000-memory.dmp

                                                                      Filesize

                                                                      992KB

                                                                    • memory/1096-648-0x00007FFCC2ED0000-0x00007FFCC3186000-memory.dmp

                                                                      Filesize

                                                                      2.7MB