Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-06-2022 14:08
Static task
static1
Behavioral task
behavioral1
Sample
e93cb5fe929c88252bbcb1ae8d73bfc6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e93cb5fe929c88252bbcb1ae8d73bfc6.exe
Resource
win10v2004-20220414-en
General
-
Target
e93cb5fe929c88252bbcb1ae8d73bfc6.exe
-
Size
5.9MB
-
MD5
e93cb5fe929c88252bbcb1ae8d73bfc6
-
SHA1
81f04e51bf83c1f9d45f333da4cf13167a89fd43
-
SHA256
32b33877baade9ad5e8fb751c6a6b4ba6176ea7699732bd5ebd2af161728ac1e
-
SHA512
4453b7f9bd989fc34816d7d8292463b0df79eeac11919d391a5695ecc76b28c97f06415768365b7af9404d733addfad7cfa9275d583452216ad398938719bc9a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1272-130-0x0000000000400000-0x0000000001003000-memory.dmp vmprotect behavioral2/memory/1272-133-0x0000000000400000-0x0000000001003000-memory.dmp vmprotect behavioral2/memory/1272-134-0x0000000000400000-0x0000000001003000-memory.dmp vmprotect behavioral2/memory/1272-135-0x0000000000400000-0x0000000001003000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
e93cb5fe929c88252bbcb1ae8d73bfc6.exepid process 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\48538982-00c2-4c2f-aded-959c8f26b3a4.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220623161042.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
e93cb5fe929c88252bbcb1ae8d73bfc6.exemsedge.exemsedge.exeidentity_helper.exepid process 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe 2732 msedge.exe 2732 msedge.exe 3444 msedge.exe 3444 msedge.exe 4848 identity_helper.exe 4848 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
e93cb5fe929c88252bbcb1ae8d73bfc6.exepid process 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
Processes:
msedge.exepid process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 3444 msedge.exe 3444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e93cb5fe929c88252bbcb1ae8d73bfc6.exemsedge.exemsedge.exedescription pid process target process PID 1272 wrote to memory of 3444 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe msedge.exe PID 1272 wrote to memory of 3444 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe msedge.exe PID 3444 wrote to memory of 4116 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4116 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2684 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2732 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 2732 3444 msedge.exe msedge.exe PID 1272 wrote to memory of 2184 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe msedge.exe PID 1272 wrote to memory of 2184 1272 e93cb5fe929c88252bbcb1ae8d73bfc6.exe msedge.exe PID 2184 wrote to memory of 5000 2184 msedge.exe msedge.exe PID 2184 wrote to memory of 5000 2184 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe PID 3444 wrote to memory of 4740 3444 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93cb5fe929c88252bbcb1ae8d73bfc6.exe"C:\Users\Admin\AppData\Local\Temp\e93cb5fe929c88252bbcb1ae8d73bfc6.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/search?q=updown.ninja/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xcc,0x104,0x7ff979fa46f8,0x7ff979fa4708,0x7ff979fa47183⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:83⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:13⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:13⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5408 /prefetch:83⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:13⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5736 /prefetch:83⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:13⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:13⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:13⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6928 /prefetch:83⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6928 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:13⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:13⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7348 /prefetch:13⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:4624 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff703825460,0x7ff703825470,0x7ff7038254804⤵PID:5000
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:13⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,2443030031442573036,16899405736144148267,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7628 /prefetch:13⤵PID:4632
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/search?q=updown.ninja/2⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff979fa46f8,0x7ff979fa4708,0x7ff979fa47183⤵PID:5000
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD50add5fc00da8a49056919913fe784d5f
SHA1c0afa0e00e7887ae38d0a6ae9d91ff68895b0a1e
SHA256675b0d8016352a343ef47bcde7fc64bcb3ed5a2c4144c190c77759b19f6f5524
SHA512275bc15ab0db5e25fd8f29bb38662eb8438d65319050a8eda24f67120dcbeee140baeb05be823fcb3c70e34209ca82feb2b9c4c0c0cee9ede0021a55bdc9dfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize430B
MD5f377ebc5b55930e06eace2117eeadf54
SHA14d95ad63945839cea1cc48bcf0bb9d305d2e4449
SHA25691f8b99f5dd5c2fad29efb0ccd3c901dbc3c1dfdd7d47b319ccd982cdffaa3b6
SHA5128f8890852f476a5ea6ddd93de091c2141cdb8ede19073a2c66a9ec0df1d92f0395acc2a926ead9161449b299628229b799adcec4b0690ac2b673f2e5b56a360b
-
Filesize
152B
MD595e22ee8bac6765a868c13fc5ca5017c
SHA1dff7d454639c700bb4408bf2cef900337977eb56
SHA256cb320ebc79962dfd60205d687132b62ac884924f6cf5c5a40aea28fd2bc44802
SHA51247fb43256f59834aaf626e3c9c9e20f71afbb018f64755d8e05f6cbd8dde21e1c14049192a90bffd99413a58a0cacebdd8bce7b3d464aa622d7eefad71145428
-
Filesize
152B
MD595e22ee8bac6765a868c13fc5ca5017c
SHA1dff7d454639c700bb4408bf2cef900337977eb56
SHA256cb320ebc79962dfd60205d687132b62ac884924f6cf5c5a40aea28fd2bc44802
SHA51247fb43256f59834aaf626e3c9c9e20f71afbb018f64755d8e05f6cbd8dde21e1c14049192a90bffd99413a58a0cacebdd8bce7b3d464aa622d7eefad71145428
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e