Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
Resource
win10v2004-20240412-en
General
-
Target
Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
-
Size
28KB
-
MD5
06fb86cb0a706457a8975951491064cb
-
SHA1
acf100409ffa610116f0085a561d7d4faefbb497
-
SHA256
de50f96cb09cc27d12eb293d84cb35a333a4c230729bd1e9673aa5c14c5b9cd9
-
SHA512
f7d2a490d5e585d9d01bb1e42fa03f4615c8fb16cbab713dcb25fc837d2c94f6f60c2bf4ab61271ee1b8f59cc6002884a922333770ad4e02697dfaac14a4f5a2
-
SSDEEP
192:lRkjoJAjnhtcr/kbN9RYW3MHaMTqBS24OwVHl1LA+8+uU77qcFkPlD2oVFoEc:gJLI/eNnnl+8+uU77qcFID2BE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1740 msedge.exe 1740 msedge.exe 3808 msedge.exe 3808 msedge.exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 4248 identity_helper.exe 4248 identity_helper.exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 3808 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 87 PID 1188 wrote to memory of 3808 1188 Skill Hack WarRock-Hacker.de[9.Juni.2009].exe 87 PID 3808 wrote to memory of 3016 3808 msedge.exe 88 PID 3808 wrote to memory of 3016 3808 msedge.exe 88 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 5016 3808 msedge.exe 89 PID 3808 wrote to memory of 1740 3808 msedge.exe 90 PID 3808 wrote to memory of 1740 3808 msedge.exe 90 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91 PID 3808 wrote to memory of 3352 3808 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skill Hack WarRock-Hacker.de[9.Juni.2009].exe"C:\Users\Admin\AppData\Local\Temp\Skill Hack WarRock-Hacker.de[9.Juni.2009].exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://warrock-hacker.de/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6d5746f8,0x7ffa6d574708,0x7ffa6d5747183⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:23⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:83⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:13⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:13⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:83⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:13⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:13⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:13⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:13⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:13⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:13⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1528,7834310666531371004,7121657592161500738,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:23⤵PID:2480
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD522bb6af63c7710354ac7070e45ac988c
SHA134d29d6b316e39ed8fb8c5efb42c4269040fcf1f
SHA2561a70d5d3dfc04e6f5cfec1ceb06676039229f895f30007fdb55b043ed48ab4fb
SHA51242c12820b5237caa5b4d5149901f84db6619a69e85cb869df06e07b3cad1b51e0c2d0545ee0129cbc8e7947fd8c2989def537ad2d58a1d5bf2c2a1bf60041ca3
-
Filesize
152B
MD562677bdc196e22a7b4c8a595efb130cd
SHA1bd2adf18caf764c8f034c08b6269d9693875f3c8
SHA256b540616d7e73ff22642f4fbe2bea0f9daa2f1166391e76cf817b2a93e0bd41d6
SHA512d23c3b9662eea6a75382242fb8e8084abc1127afbd2632f161df71a2aefaf223621511e1bf6229cf7e86313101a8d9dfe2f20e1c0bd481066e1969cd6fa75e32
-
Filesize
6KB
MD5838a9d568efbd2537bd1e7753d3c05d3
SHA1e0ef4deca8f8c0755b2a6119cc1db5a5df61525d
SHA256512015c68b7259ac046aa7fb281d8b5cac4af6eb7e8e18b682b95d4b7f940c72
SHA512bed258732d56fbda4fd4f46fb68dda1d0c109814c97344010cf7e41dfacca0f22a2b8a5a3a5f1e769d90a36bc8de020d6b3e77d5e2853b93720aee356a115248
-
Filesize
6KB
MD56d22275a6911c6a43080a33cea7c48ee
SHA1a9c12cdbdc5299965daca108da5f362022df6d43
SHA2566e62349e318f103c0a02a67c4d49f6797e85f9e6372c9c95b4549a8d5b34455d
SHA51202cd600cbf870537bdd10ef649fd9067e4adb19010ad319c6a509c7477225f53647d102872490652b59183673c6c7a95e342a9fb3c5afe931ba1b95441004809
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5bbe49c2e188df4900fdb5f89c2e72029
SHA1ae091b45c986c75fce7a1843023b03085cfa766c
SHA2562b1b14e17bc417e074ba1dd29de66ddeb67c68c6d9c3c831e8a0674932d9f9f8
SHA51213e1a00d708cd122bd26cd3014a7df5bfe0f80b3feabb5e3f0c2da8394b2dec8872cb31df2e57f3c197a723a519d51defa90d85bcb0ad33f19ef13232153f96d