Overview
overview
3Static
static
3nord-exter...in.zip
windows7-x64
1nord-exter...in.zip
windows10-2004-x64
1nord-exter...x.html
windows7-x64
1nord-exter...x.html
windows10-2004-x64
1nord-exter...e.html
windows7-x64
1nord-exter...e.html
windows10-2004-x64
1nord-exter...x.html
windows7-x64
1nord-exter...x.html
windows10-2004-x64
1nord-exter...e.html
windows7-x64
1nord-exter...e.html
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...w3.dll
windows7-x64
1nord-exter...w3.dll
windows10-2004-x64
1nord-exter...x.html
windows7-x64
1nord-exter...x.html
windows10-2004-x64
1nord-exter...e.html
windows7-x64
1nord-exter...e.html
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
nord-external-main.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nord-external-main.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_8dox.html
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_8dox.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_guide.html
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_guide.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_8dox.html
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_8dox.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_guide.html
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/window_guide.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw-w64/glfw3.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw-w64/glfw3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw/glfw3.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-mingw/glfw3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-static-ucrt/glfw3.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-static-ucrt/glfw3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2010/glfw3.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2010/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2012/glfw3.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2012/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2013/glfw3.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2013/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2015/glfw3.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2015/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2019/glfw3.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2019/glfw3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2022/glfw3.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/lib-vc2022/glfw3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_8dox.html
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_8dox.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_guide.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nord-external-main/dependencies/glfw-3.3.8.bin.WIN64/docs/html/build_guide.html
Resource
win10v2004-20240426-en
General
-
Target
nord-external-main/dependencies/glfw-3.3.8.bin.WIN32/docs/html/vulkan_guide.html
-
Size
20KB
-
MD5
12fd8a57a38999c181538eff49dfa759
-
SHA1
2d1b9e17aa231fb977ead211275fc9a146a5c308
-
SHA256
5ff88edca238fe90f9736e936a8cc46c0838b4dd444f858dc667f7df88d937fb
-
SHA512
daa5405d9c02705fa2bce095f2b0f8b086d4f880a3967d74bc20b6372cfe251209f3c10f3f0c985cb632b30e30d33aa7870c4965cb2417e7afaeecbfed6bad7a
-
SSDEEP
384:kHQmC/0nHOKa9/rSGlqjQ0OS1DBbF7AlkgO4DliIate9b84xSnJC:sQmm0nHOKaxrSGlqjlNBbxEvdIxnJC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1536 msedge.exe 1536 msedge.exe 4480 identity_helper.exe 4480 identity_helper.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1128 1536 msedge.exe 83 PID 1536 wrote to memory of 1128 1536 msedge.exe 83 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 2092 1536 msedge.exe 84 PID 1536 wrote to memory of 1444 1536 msedge.exe 85 PID 1536 wrote to memory of 1444 1536 msedge.exe 85 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86 PID 1536 wrote to memory of 3504 1536 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\nord-external-main\dependencies\glfw-3.3.8.bin.WIN32\docs\html\vulkan_guide.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986b46f8,0x7ffe986b4708,0x7ffe986b47182⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6200028629063103876,16340040742304081049,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
180B
MD591907f502460220c3db756e47c0e07a4
SHA1e80be32aa0017e96c5d856cf7d4a59dfd6813a5e
SHA256266b101d48d4b204f2853c24c33a2737566414d4d586e7205f5d1c748498dbd7
SHA512acf7eeba017fb43cfc85b898e8bcc76632b3494bba90c1962fd3943b8c546c06594a03d40033be8dd4a461952b3e80370ed051d060f22da4f0d6e2b545e1a364
-
Filesize
5KB
MD5ccf914a2acee8f5b37a52cc7fe75f013
SHA1f6b6cc929b41287240feab7a0cafdb19820c7b15
SHA256e73462a7d6fb99b9b75d6552ef360af397705e2195b6d0ae0b84b4f4ea3ff92a
SHA512485f7a9c3a86d1a55fded5369b6bd2b88b9555f5bf8b4901fcda5d874174e3fb6335c0920813000a364547a393682a935d8e98c0f502bf881c3fbd9a994492b6
-
Filesize
6KB
MD551c079634d72715d99e302c0927dd6ff
SHA1303e56887acb37181459f4f4cc5a86de837bca09
SHA2566a9a2b849d939a7ab674b55687a1c4698d208142021a801abfec00602b9d7c9d
SHA512cd406923955a95774d44f4a17e15c953a6baea17f9e4a62ccd13d816de56a1213113d77e904385558e506b02455851c1f1f94c35f46f10b8340b4bb96552c071
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3ac4af425413e785a364b139a9ffb32
SHA13c30e2feb0c0e970e580da076f8aeca4029cdb17
SHA256c2b9cb2210c4c495d7417e8286a4050086ad38775dce6e416d2c7a764f8fcce5
SHA512b2b637a4742d11611bb4ede5198deb1b04e2b97fb22c5f26ee8d7825da4b689cc255d46d6a1b2c96dfc81f4b8bdac514265fa20c9ce0be067f98717a711a4e25