Analysis
-
max time kernel
163s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe
Resource
win10v2004-20220812-en
General
-
Target
c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe
-
Size
129KB
-
MD5
98c2327ab98096861171ae4f6846e662
-
SHA1
692aebee9149cf25b70da842456c16b3e5553085
-
SHA256
c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb
-
SHA512
73d38d5c268533d3e0a3b3feb2ea091da81e6ba29231da23a0f0db11185cc8aa40984b1d788e1a2dd5ae8c30f47eeff36180d74bc16cf9f4dd86367a4c0b9215
-
SSDEEP
3072:zQIURTXJcuFxM//D/IiIQirww/lRN58TuNVHjdZYXLSd:zsW+x+IiIAwNRgTYVDdz
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 19 4888 WScript.exe 100 4888 WScript.exe 102 4888 WScript.exe 103 4888 WScript.exe 104 4888 WScript.exe 111 4888 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 4904 undelfile.exe 4824 Au_.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe -
Loads dropped DLL 1 IoCs
pid Process 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e65a2f66-1d0d-46b7-a9b7-41122bcc9508.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220919052015.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022e23-135.dat nsis_installer_2 behavioral2/files/0x0006000000022e23-136.dat nsis_installer_2 behavioral2/files/0x0007000000022e21-140.dat nsis_installer_2 behavioral2/files/0x0007000000022e21-139.dat nsis_installer_2 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 532 msedge.exe 532 msedge.exe 4196 identity_helper.exe 4196 identity_helper.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 532 msedge.exe 532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 4888 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe 81 PID 1336 wrote to memory of 4888 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe 81 PID 1336 wrote to memory of 4888 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe 81 PID 1336 wrote to memory of 4904 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe 82 PID 1336 wrote to memory of 4904 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe 82 PID 1336 wrote to memory of 4904 1336 c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe 82 PID 4904 wrote to memory of 4824 4904 undelfile.exe 83 PID 4904 wrote to memory of 4824 4904 undelfile.exe 83 PID 4904 wrote to memory of 4824 4904 undelfile.exe 83 PID 4888 wrote to memory of 532 4888 WScript.exe 84 PID 4888 wrote to memory of 532 4888 WScript.exe 84 PID 532 wrote to memory of 2032 532 msedge.exe 85 PID 532 wrote to memory of 2032 532 msedge.exe 85 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4336 532 msedge.exe 88 PID 532 wrote to memory of 4632 532 msedge.exe 89 PID 532 wrote to memory of 4632 532 msedge.exe 89 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90 PID 532 wrote to memory of 3724 532 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe"C:\Users\Admin\AppData\Local\Temp\c6d893067a788a46a07d631e48798baff420430ebc097981aaa3a09bd63965bb.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\foxdown.jse"2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://down.tian-kong.com/install/meng.html3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xb0,0xdc,0x100,0x40,0x104,0x7ff8aadd46f8,0x7ff8aadd4708,0x7ff8aadd47184⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:24⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:84⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:14⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:14⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 /prefetch:84⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:14⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:14⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 /prefetch:84⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:14⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:14⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:14⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:84⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:3548 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6a5bb5460,0x7ff6a5bb5470,0x7ff6a5bb54805⤵PID:4276
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:14⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5580 /prefetch:84⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:14⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7020 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,8931047753611962802,10278188178053243027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5596 /prefetch:84⤵PID:3436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\undelfile.exe"C:\Users\Admin\AppData\Local\Temp\undelfile.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Executes dropped EXE
PID:4824
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD546af444b9c8ddbab7589329d5b0c4616
SHA114fa83ff4953caddb31d8a1d81530b2d3b871952
SHA25643df685ccd1200455dcf56b0c7fe313e3b8c563bde078896b9cb61ac10576ac9
SHA512e3a5d6251e766f3e6bc80756ed93b6caf090d937490847a20466baca3341d1d9444dec928e8c7498ef19d69f4b3a05c8d79370b5db1aaba13cf1a438395b43df
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
126B
MD55525e101f29aa9c294f2015de4f4c807
SHA11e61346677e6b4628162caf056ff4dd703c7a409
SHA256dfc7656c3360840b2e5e2081c2f70f1d56bf19bc14472672997db4390e2dc416
SHA512ed79873415a13f658b42a3f6666d5ef88047b5051ac4db0587378514394711b84e9d0d36b5125f2144953b7cd0114f24b709ce8a353c6ec6b1ceb0bd326bfa96
-
Filesize
40KB
MD5fa1289433a5aec7b67c5c567c560017f
SHA13ce0ea5534516dc56243de2550ab250971db01c1
SHA25602ffd75facf27ff64a52611e06d4108e8ff172f3c889b96887f243b084c4c3c3
SHA512535fe49c975bf44f265ebee0c0c24725453ea43eec287b719b5538829c70e0b29c632c6aa0cb01244a73bcdbe50570824ccc85d01c8e3a04dc5dcdd6072563dd
-
Filesize
40KB
MD5fa1289433a5aec7b67c5c567c560017f
SHA13ce0ea5534516dc56243de2550ab250971db01c1
SHA25602ffd75facf27ff64a52611e06d4108e8ff172f3c889b96887f243b084c4c3c3
SHA512535fe49c975bf44f265ebee0c0c24725453ea43eec287b719b5538829c70e0b29c632c6aa0cb01244a73bcdbe50570824ccc85d01c8e3a04dc5dcdd6072563dd
-
Filesize
40KB
MD5fa1289433a5aec7b67c5c567c560017f
SHA13ce0ea5534516dc56243de2550ab250971db01c1
SHA25602ffd75facf27ff64a52611e06d4108e8ff172f3c889b96887f243b084c4c3c3
SHA512535fe49c975bf44f265ebee0c0c24725453ea43eec287b719b5538829c70e0b29c632c6aa0cb01244a73bcdbe50570824ccc85d01c8e3a04dc5dcdd6072563dd
-
Filesize
40KB
MD5fa1289433a5aec7b67c5c567c560017f
SHA13ce0ea5534516dc56243de2550ab250971db01c1
SHA25602ffd75facf27ff64a52611e06d4108e8ff172f3c889b96887f243b084c4c3c3
SHA512535fe49c975bf44f265ebee0c0c24725453ea43eec287b719b5538829c70e0b29c632c6aa0cb01244a73bcdbe50570824ccc85d01c8e3a04dc5dcdd6072563dd