Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3nord-exter...in.zip
windows7-x64
1nord-exter...in.zip
windows10-2004-x64
1nord-exter...x.html
windows7-x64
1nord-exter...x.html
windows10-2004-x64
1nord-exter...e.html
windows7-x64
1nord-exter...e.html
windows10-2004-x64
1nord-exter...x.html
windows7-x64
1nord-exter...x.html
windows10-2004-x64
1nord-exter...e.html
windows7-x64
1nord-exter...e.html
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...x.html
windows7-x64
1nord-exter...x.html
windows10-2004-x64
1nord-exter...e.html
windows7-x64
1nord-exter...e.html
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
nord-external-main.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nord-external-main.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_8dox.html
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_8dox.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_guide.html
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_guide.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_8dox.html
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_8dox.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_guide.html
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_guide.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw-w64/glfw3.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw-w64/glfw3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw/glfw3.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw/glfw3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-static-ucrt/glfw3.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-static-ucrt/glfw3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2010/glfw3.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2010/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2012/glfw3.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2012/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2013/glfw3.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2013/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2015/glfw3.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2015/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2019/glfw3.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2019/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2022/glfw3.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2022/glfw3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_8dox.html
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_8dox.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_guide.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_guide.html
Resource
win10v2004-20240426-en
General
-
Target
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_8dox.html
-
Size
2KB
-
MD5
a54b8679ac8ccd943b7e2f47c8c6885a
-
SHA1
c096b1ddc72de9ee5ac3f5b0b3cd9293b67aeb06
-
SHA256
244d38763f7f4c193d83c862d3eeca32e2157c156c496cc8d56a50f27803e2d2
-
SHA512
f1e1c766770586a33d479c993f6229a92f6532ab0f154d3735d8eb0f1916ecf5a716c4d88882fe628752eda251b253e93a9605f0b02a41f1da931c6ffd89e45a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2144 msedge.exe 2144 msedge.exe 3968 identity_helper.exe 3968 identity_helper.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1640 2144 msedge.exe 84 PID 2144 wrote to memory of 1640 2144 msedge.exe 84 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 3848 2144 msedge.exe 85 PID 2144 wrote to memory of 2724 2144 msedge.exe 86 PID 2144 wrote to memory of 2724 2144 msedge.exe 86 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87 PID 2144 wrote to memory of 4632 2144 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\nord-external-main\dependencies\glfw-3.3.8.bin.WIN64\docs\html\build_8dox.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13316224532686918703,4042841411912873855,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
180B
MD591907f502460220c3db756e47c0e07a4
SHA1e80be32aa0017e96c5d856cf7d4a59dfd6813a5e
SHA256266b101d48d4b204f2853c24c33a2737566414d4d586e7205f5d1c748498dbd7
SHA512acf7eeba017fb43cfc85b898e8bcc76632b3494bba90c1962fd3943b8c546c06594a03d40033be8dd4a461952b3e80370ed051d060f22da4f0d6e2b545e1a364
-
Filesize
6KB
MD58eb5923ebb63d5f6ea5f54c7c227c936
SHA1041b028c351a0ef11b7c77c945a30fabcb6e293c
SHA2565aad36df58080882ce48e8a38b39e66bc43d0546050ec9a6db9dc640f68b9f97
SHA5123d0996b2a171b4de634faf54fa419eba3e3d2146bd1198e1a480f6e15bb25e5a17791b4d74fef8a878d4cd701ff7522b1cc11fee4b87cff880e81d10ce3bb685
-
Filesize
5KB
MD59ac78c0e5424146d2da0ef7f3294f463
SHA18f2e432233ced2e9146d016439b23eefb829789f
SHA256f0066d67dae612507434fd283d92d2c8a97f1f6d0f3bfbe98990e2972dcfd9b3
SHA512b1622f1bd77eb8056bed5cf1413b8c91621ad592c962f140b116e84b3c17435a443dc7c721202e57fa4b2e7aad538cb79218ef3ee49386c505e1a26deb8414a2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55263abccf7902d3cf276b77f154ed787
SHA1eba27c36095c035c8cc208603c01008b7287bd2a
SHA25614aa89fee02485d7f50f2812aa8aa0245e535030948e2fcbe9b35fe7793ccaaf
SHA512c8f4e32fad547c9648610a77ca306e0afc5bb7b02c54ba8be8fbbfe6ff911c904cd3aaf16d97fa353d307d061ed351d6b5ad5e485358457947270ed7aecdffdd