Overview
overview
6Static
static
1Night Visi....4.zip
windows7-x64
6Night Visi....4.zip
windows10-2004-x64
1manifest.json
windows7-x64
3manifest.json
windows10-2004-x64
3pack_icon.png
windows7-x64
3pack_icon.png
windows10-2004-x64
3shaders/gl...agment
windows7-x64
3shaders/gl...agment
windows10-2004-x64
3shaders/gl...vertex
windows7-x64
3shaders/gl...vertex
windows10-2004-x64
3shaders/gl...agment
windows7-x64
3shaders/gl...agment
windows10-2004-x64
3shaders/gl...nt.old
windows7-x64
3shaders/gl...nt.old
windows10-2004-x64
3shaders/hl...t.hlsl
windows7-x64
3shaders/hl...t.hlsl
windows10-2004-x64
3shaders/hl...x.hlsl
windows7-x64
3shaders/hl...x.hlsl
windows10-2004-x64
3shaders/hl...t.hlsl
windows7-x64
3shaders/hl...t.hlsl
windows10-2004-x64
3shaders/hl...sl.old
windows7-x64
3shaders/hl...sl.old
windows10-2004-x64
3Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/03/2023, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
Night Vision Pack 1.0.4.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Night Vision Pack 1.0.4.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
manifest.json
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
manifest.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
pack_icon.png
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
pack_icon.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
shaders/glsl/entity.fragment
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
shaders/glsl/entity.fragment
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
shaders/glsl/entity.vertex
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
shaders/glsl/entity.vertex
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
shaders/glsl/renderchunk.fragment
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
shaders/glsl/renderchunk.fragment
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
shaders/glsl/renderchunk.fragment.old
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
shaders/glsl/renderchunk.fragment.old
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
shaders/hlsl/entity.fragment.hlsl
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
shaders/hlsl/entity.fragment.hlsl
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
shaders/hlsl/entity.vertex.hlsl
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
shaders/hlsl/entity.vertex.hlsl
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
shaders/hlsl/renderchunk.fragment.hlsl
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
shaders/hlsl/renderchunk.fragment.hlsl
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
shaders/hlsl/renderchunk.fragment.hlsl.old
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
shaders/hlsl/renderchunk.fragment.hlsl.old
Resource
win10v2004-20230220-en
General
-
Target
Night Vision Pack 1.0.4.zip
-
Size
11KB
-
MD5
86dbdd76beec5ee2e937b20246ad96f7
-
SHA1
b6bbd92066b03ef3e5c1301b21a6180f645f2a91
-
SHA256
cf60eacd48c1c27cad4b9d3754e6af6c6a6770748b4111916c53eda44f73b9f5
-
SHA512
a2e618a4f1d0087a869b111ff7875f531bc7cb99fb8264b0b3b9446f9b89a61d628136302ddc206f63820d049a5800342e966bcd57d0cff4ac7a1824a66c33db
-
SSDEEP
192:7uW3fpXAQ0lfsHy8QPH14QJOY2Fm2EP699Fhk/bzBlQvV+cVU2Cpl8HnjprWqDWv:7uW3RQsyfP14NY2kMFhMbzBlAUplYtDI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: 33 3064 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3064 AUDIODG.EXE Token: 33 3064 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3064 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1616 1596 chrome.exe 29 PID 1596 wrote to memory of 1616 1596 chrome.exe 29 PID 1596 wrote to memory of 1616 1596 chrome.exe 29 PID 1180 wrote to memory of 1164 1180 chrome.exe 31 PID 1180 wrote to memory of 1164 1180 chrome.exe 31 PID 1180 wrote to memory of 1164 1180 chrome.exe 31 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1180 wrote to memory of 832 1180 chrome.exe 33 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35 PID 1596 wrote to memory of 1676 1596 chrome.exe 35
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Night Vision Pack 1.0.4.zip"1⤵PID:316
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c09758,0x7fef6c09768,0x7fef6c097782⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1200,i,13053348682320942654,9103424324051729918,131072 /prefetch:22⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1200,i,13053348682320942654,9103424324051729918,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c09758,0x7fef6c09768,0x7fef6c097782⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1204 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:22⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:82⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2180 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2200 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1464 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:22⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1436 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3820 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4040 --field-trial-handle=1272,i,11185789684201893693,14378184586453300342,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:680
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2908
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5401⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵PID:2204
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵PID:2212
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5d33b61c2fc1dd881d02d27617d77b65e
SHA15a3f6949857e1787a99c912577346ff6000fedd2
SHA256983865fa820512337344a27d32709dbd2cbea157fe5b9ed8a7f29c8875013f59
SHA5128ecfa11596f65b25ac4838aaa6aacb5468488fd1345c269b19c37c265d29adcb4b42da5555c0c1518a6b720868ecd4d2acd26872d601ab92693a433fae15592c
-
Filesize
40B
MD5d33b61c2fc1dd881d02d27617d77b65e
SHA15a3f6949857e1787a99c912577346ff6000fedd2
SHA256983865fa820512337344a27d32709dbd2cbea157fe5b9ed8a7f29c8875013f59
SHA5128ecfa11596f65b25ac4838aaa6aacb5468488fd1345c269b19c37c265d29adcb4b42da5555c0c1518a6b720868ecd4d2acd26872d601ab92693a433fae15592c
-
Filesize
40B
MD5d33b61c2fc1dd881d02d27617d77b65e
SHA15a3f6949857e1787a99c912577346ff6000fedd2
SHA256983865fa820512337344a27d32709dbd2cbea157fe5b9ed8a7f29c8875013f59
SHA5128ecfa11596f65b25ac4838aaa6aacb5468488fd1345c269b19c37c265d29adcb4b42da5555c0c1518a6b720868ecd4d2acd26872d601ab92693a433fae15592c
-
Filesize
40B
MD5d33b61c2fc1dd881d02d27617d77b65e
SHA15a3f6949857e1787a99c912577346ff6000fedd2
SHA256983865fa820512337344a27d32709dbd2cbea157fe5b9ed8a7f29c8875013f59
SHA5128ecfa11596f65b25ac4838aaa6aacb5468488fd1345c269b19c37c265d29adcb4b42da5555c0c1518a6b720868ecd4d2acd26872d601ab92693a433fae15592c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5e3969ea06799181e74957e26beb10498
SHA1174e72a1d075e588db02959df9d0acf4116ba09a
SHA2565e46c0d12f27df38bf8cceed32ce6d58136924ead186bb42de67d5b46e80e86a
SHA512ac7a4191fa56aaf4068bcdd0c0daccdf80d4ff89054d4dfef8b7da04aa1f6da49f1196199556486f579b1997b2b0e08f7704b5038fc5bd4756c2ab4910ef7f9c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
144KB
MD553aa6bbf79b2e166f44b6c8c14f6a73c
SHA10b27f98b754b826da5dc7d07a831bb8d3b7cb34b
SHA256bd086496882e1be927305ed4f1b7c69b0dcab994fd80ad4fbbae2ba745fdd80a
SHA512444df16765bfdda14d5587a1641a6ec89bbcc3ccb1aa04e6514a13521542cf7075a347e79533ae33de5d8150da63a7fccb60a9c1cb0367f94e307b569edc9c2e
-
Filesize
71KB
MD507532af61cec7121b24c5d4a76650f0b
SHA10f2db6a8c4b323782bb0a2356eb285fda762222d
SHA2560b0e2cd79c54a27b499a15e7081eabd48385abddd66ef96653437994f628d73f
SHA5129b22a5e30d8dfb8d4ef0092913701823171eab391edcd87e77701cd2dd908ca51a5e167f98e3664fe1813b8e50a8d2827f85aa583eafb9dd11273da0c6a1f9e6
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
71KB
MD507532af61cec7121b24c5d4a76650f0b
SHA10f2db6a8c4b323782bb0a2356eb285fda762222d
SHA2560b0e2cd79c54a27b499a15e7081eabd48385abddd66ef96653437994f628d73f
SHA5129b22a5e30d8dfb8d4ef0092913701823171eab391edcd87e77701cd2dd908ca51a5e167f98e3664fe1813b8e50a8d2827f85aa583eafb9dd11273da0c6a1f9e6
-
Filesize
144KB
MD5575d866a7ed1f88b4304831b9a8273b9
SHA173e4f5c6966e3f6fc0e657b409d30cf7d58c1715
SHA2560d3d33c23d37234b924b84b9095a3e00b55bd3f7d8900281b5b19efdf8122f5f
SHA5121245e7af631d515fd3d1dea276a6315df3e769b430b422ac8b08e408de60553a1f3d7705762e56bb3cdb152be425bc1a772102043ef51c54e2cc0321056d983f
-
Filesize
546B
MD5df03e65b8e082f24dab09c57bc9c6241
SHA16b0dacbf38744c9a381830e6a5dc4c71bd7cedbf
SHA256155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba
SHA512ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99
-
Filesize
523B
MD5d58da90d6dc51f97cb84dfbffe2b2300
SHA15f86b06b992a3146cb698a99932ead57a5ec4666
SHA25693acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad
SHA5127f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636