Analysis
-
max time kernel
536s -
max time network
545s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
phasmophobia-ghost-groan.mp3
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
phasmophobia-ghost-groan.mp3
Resource
win10v2004-20240419-en
General
-
Target
phasmophobia-ghost-groan.mp3
-
Size
56KB
-
MD5
748d8a1626a19ffc1243d9555f67abd7
-
SHA1
091f6b7d9b237a6088dcb32501f7fdc06a79b82e
-
SHA256
8454e5eff53fb19401834d3947faeedf0812b89146ec3690c321bb601b5af70b
-
SHA512
7bff53a4ea5172b2d599632c992b85c7cff1798fac901802bf6be6abc82f15d408b0ff812194a9cd94ee7bac3c4ec0a852379bf409212096879d9c4740bf2f72
-
SSDEEP
768:881oqcsmCeL9RnkRKkzw6qi7LIDfhfV9fTaqCujl4G:88SqgLTnkRRwzMwV71j6G
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 4240 msedge.exe 4240 msedge.exe 816 identity_helper.exe 816 identity_helper.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1436 unregmp2.exe Token: SeCreatePagefilePrivilege 1436 unregmp2.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2396 1912 wmplayer.exe 86 PID 1912 wrote to memory of 2396 1912 wmplayer.exe 86 PID 1912 wrote to memory of 2396 1912 wmplayer.exe 86 PID 1912 wrote to memory of 728 1912 wmplayer.exe 87 PID 1912 wrote to memory of 728 1912 wmplayer.exe 87 PID 1912 wrote to memory of 728 1912 wmplayer.exe 87 PID 728 wrote to memory of 1436 728 unregmp2.exe 88 PID 728 wrote to memory of 1436 728 unregmp2.exe 88 PID 4240 wrote to memory of 3640 4240 msedge.exe 95 PID 4240 wrote to memory of 3640 4240 msedge.exe 95 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 1840 4240 msedge.exe 96 PID 4240 wrote to memory of 4620 4240 msedge.exe 97 PID 4240 wrote to memory of 4620 4240 msedge.exe 97 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98 PID 4240 wrote to memory of 5104 4240 msedge.exe 98
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\phasmophobia-ghost-groan.mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\phasmophobia-ghost-groan.mp3"2⤵PID:2396
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe33af46f8,0x7ffe33af4708,0x7ffe33af47182⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4424 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14372232118252598403,10177878893345197823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:5268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
6KB
MD561b24d16e0402954a92c8a9e8cf8e503
SHA17871ff2e3c02242b422dad16a0f477121fc5b0e9
SHA2569f120eacf84912e327e551014574e246b374a5aa1148e6ef87447fbb41d695c4
SHA5123b8a5aead59ea70a8d02e28b746942de88e52f41ae9c7ab8a61f65e1e3ebd9201fdc886b521e05392acb3656355489720056d9c1240973cd98c10bfa86e350c5
-
Filesize
6KB
MD543119321309a997d6df557d9c75ea0cf
SHA1dadb21154b5f15a629bc42ed8e5c73c1dc10626d
SHA256fd88d43187e2430425296f6dc2da174d5c25e363c3276861225a880c6f5a905b
SHA51226c553e10e9bd341af61e11112605a5e2c3beef6516eeffa3032f8368866516bc2977562a33baf2f9d22808ef9519e22e3f387a9a447cb51e48739aa34e3a72f
-
Filesize
6KB
MD5cce8d7723a7667fa6e44ca10a3d3093f
SHA1e9f5c279af43c6ecef4257872da56904c18a686a
SHA256325346db6f7906e89ac4932e4acd34dc15cea83e422a3d64b7d92e1583af9b16
SHA5125522d24393301c41d762e85fa16a0a7df1e407f085fabdb15eef1b7a123db83629eab9b29091bee24f07cb4520dd588581e8afccd4e8dcf65a9e56ebe1ccdc4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5ab7d6f45acdcde9233e14578fac7a346
SHA133809eaadec093cbc81a0f0e4072a01efd41bd83
SHA2562c1bce00932ea6d126e9c5c0bcb17bbfb521d5ced0e9b92068494e4cd356acd2
SHA512cadf80b0671fe92f2ec191c602a24057530b6ae62075f2cddfc996d1c9f04b516cfcc4bdfed32a3cedb2ebeb993d81dd28d99155639672f3f7e424526b62a923
-
Filesize
8KB
MD599a014b593a8a9b3b41580b2109841c7
SHA1afe5a137128a4eba232ad181f04edd9097e49b96
SHA2567132088b0ed40c75c5e2f1d2ff568d3b445cdbc39868324e1725ec4a9d8a07ae
SHA51246d6d0ac067086230362fe49cb56ad3cb5a8f317f41d419f121af7f24fe5d4a5fbafd9d239dbeef05beb6fae020d108224f5a0139ba0fa028420d39910714e15
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5407da42de32f26328d62730f50020f5c
SHA1f22b09b47efcd958a6856083d933c727ad7104aa
SHA2561951b7cad094269d49f39b4a6ef91b64b38ef887b14fea21c917692fffa671a6
SHA51224ffbf1b3e6d87d683089999c08156918bc9d6796c15dd14028f0d4db30f7182616579d58ff7a975c1890396b964d28f698fc4068e3c210ac32c8b220a40552a