Overview
overview
3Static
static
3免费版/...OX.dll
windows7-x64
1免费版/...OX.dll
windows10-2004-x64
1免费版/...ib.dll
windows7-x64
1免费版/...ib.dll
windows10-2004-x64
1免费版/...ta.dll
windows7-x64
1免费版/...ta.dll
windows10-2004-x64
1免费版/...er.exe
windows7-x64
1免费版/...er.exe
windows10-2004-x64
1免费版/...wn.exe
windows7-x64
1免费版/...wn.exe
windows10-2004-x64
1免费版/...er.exe
windows7-x64
1免费版/...er.exe
windows10-2004-x64
1免费版/NiniReg.bat
windows7-x64
1免费版/NiniReg.bat
windows10-2004-x64
1免费版/...eg.bat
windows7-x64
1免费版/...eg.bat
windows10-2004-x64
1免费版/...te.exe
windows7-x64
1免费版/...te.exe
windows10-2004-x64
1免费版/...er.exe
windows7-x64
1免费版/...er.exe
windows10-2004-x64
1免费版/NiniWeb.dll
windows7-x64
1免费版/NiniWeb.dll
windows10-2004-x64
1免费版/...es.exe
windows7-x64
1免费版/...es.exe
windows10-2004-x64
1免费版/help.pdf
windows7-x64
1免费版/help.pdf
windows10-2004-x64
1免费版/...in.htm
windows7-x64
1免费版/...in.htm
windows10-2004-x64
1免费版/ninicom.dll
windows7-x64
1免费版/ninicom.dll
windows10-2004-x64
1免费版/...��.url
windows7-x64
1免费版/...��.url
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 06:40
Behavioral task
behavioral1
Sample
免费版/Interop.ADOX.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
免费版/Interop.ADOX.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
免费版/Interop.NiniComLib.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
免费版/Interop.NiniComLib.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
免费版/MySql.Data.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
免费版/MySql.Data.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
免费版/NiniDataBrowser.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
免费版/NiniDataBrowser.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
免费版/NiniDown.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
免费版/NiniDown.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
免费版/NiniPoster.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
免费版/NiniPoster.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
免费版/NiniReg.bat
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
免费版/NiniReg.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
免费版/NiniUnreg.bat
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
免费版/NiniUnreg.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
免费版/NiniUpdate.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
免费版/NiniUpdate.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
免费版/NiniUrlEncoder.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
免费版/NiniUrlEncoder.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
免费版/NiniWeb.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
免费版/NiniWeb.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
免费版/UpdateRules.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
免费版/UpdateRules.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
免费版/help.pdf
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
免费版/help.pdf
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
免费版/htm/main.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
免费版/htm/main.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
免费版/ninicom.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
免费版/ninicom.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
免费版/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
免费版/新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
免费版/help.pdf
-
Size
1.6MB
-
MD5
72236dce71048257936b94945cdf6808
-
SHA1
9f3b736af590659218aef230d0b4661880939bc7
-
SHA256
1d1fd5f4db1dadd89c3f7d59301587c572d5935b14c698377128dc13167a11ec
-
SHA512
8ea2ae6e9fb7ccb1c36899287f890eaf40d8d762cad2c2ab388802683413c1a093ef449ea4a89c20af00c2055ea2e637f97145bf47f21c441826a1fd2d31c870
-
SSDEEP
49152:DhOBGUlfKAaB5ubjqUACfOl8VatdgjtTef90nsQaKxYscevW:DhOGUFKAIEbjqUH5V9Qf90nzaCfFW
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1092 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4296 1092 AcroRd32.exe 93 PID 1092 wrote to memory of 4296 1092 AcroRd32.exe 93 PID 1092 wrote to memory of 4296 1092 AcroRd32.exe 93 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 2076 4296 RdrCEF.exe 95 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1716 4296 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\免费版\help.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6B34BA0407497936A853597497F7FCE6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6B34BA0407497936A853597497F7FCE6 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:1716
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F7EE38F763FFFF1FE21B4647646E6B43 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2076
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F04DEEBEFB0A96951A74837126C4D794 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4252
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1BE32CE11F5D7E7E8DA645C74E2D60CB --mojo-platform-channel-handle=1836 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7F45ECA413490BA156AAEB258E3723B7 --mojo-platform-channel-handle=2348 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3376
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=57A6538BACFB7B774C76BA37FDD4B657 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=57A6538BACFB7B774C76BA37FDD4B657 --renderer-client-id=8 --mojo-platform-channel-handle=2352 --allow-no-sandbox-job /prefetch:13⤵PID:2384
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD526d4bef9279ee7b2d9c97954a283afa8
SHA14b88edd8724de4d774f99192e2b4792b7a938e2f
SHA256029ace03a39b2436a84521a6d691c67d2a964949dbe266408bd1ceb935d2465c
SHA5127f39b22dff7e8fb7021dedf3870a6357bb9c4dac64543a33b27c9c5a5894098f2900e6bc21d4d19de2a87a48511dacdd8cf5f85b9276cbb2f07e58994f9c6870
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
32KB
MD58595730bc819f10935c334a9d4929b37
SHA1dd46224a2945034906a05b49058b344c59e2457f
SHA25658623bfe1e3b19e3739c6ec9ea399f8f02671a0a3c953269905a530ba6abb00d
SHA512df3db505432fafd92adfacc60c5ec0d8f4455e6b887074299b0ee0fdbfa304bcec13577f413e0c4baba4851e3839e7b01a369bd310f792f2a89c8e18eea47a11