Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
31775982923...18.exe
windows7-x64
71775982923...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Lang/__init__.py
windows7-x64
3Lang/__init__.py
windows10-2004-x64
3Lang/__init__.pyc
windows7-x64
3Lang/__init__.pyc
windows10-2004-x64
3Lang/lang.py
windows7-x64
3Lang/lang.py
windows10-2004-x64
3Lang/lang.pyc
windows7-x64
3Lang/lang.pyc
windows10-2004-x64
3MSVCR71.dll
windows7-x64
3MSVCR71.dll
windows10-2004-x64
3MyTorrentD...er.exe
windows7-x64
1MyTorrentD...er.exe
windows10-2004-x64
1MyTorrentD...er.url
windows7-x64
6MyTorrentD...er.url
windows10-2004-x64
3Uninst.exe
windows7-x64
7Uninst.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3_controls_.dll
windows7-x64
1_controls_.dll
windows10-2004-x64
1_core_.dll
windows7-x64
1_core_.dll
windows10-2004-x64
1_gdi_.dll
windows7-x64
1_gdi_.dll
windows10-2004-x64
1_hashlib.dll
windows7-x64
1_hashlib.dll
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
17759829236db1127ff2c0c1edcd6147_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17759829236db1127ff2c0c1edcd6147_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
Lang/__init__.py
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Lang/__init__.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Lang/__init__.pyc
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Lang/__init__.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Lang/lang.py
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
Lang/lang.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Lang/lang.pyc
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
Lang/lang.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
MSVCR71.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
MSVCR71.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
MyTorrentDownloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
MyTorrentDownloader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
MyTorrentDownloader.url
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
MyTorrentDownloader.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Uninst.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Uninst.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
_controls_.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
_controls_.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
_core_.dll
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
_core_.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
_gdi_.dll
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
_gdi_.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
_hashlib.dll
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
_hashlib.dll
Resource
win10v2004-20240611-en
General
-
Target
MyTorrentDownloader.url
-
Size
60B
-
MD5
0da88e17dc0bf5d3098df87ef3fd7ace
-
SHA1
524251ae4d33813330d07f6e7013743eff9f3bce
-
SHA256
a16adc8994c02a971320605c28088ce5b24d0426b80a7e085af13ed9a6d3a190
-
SHA512
88f811b0911e9714cc4679fd5f5383e046cae0f8f3a8b4e84306c8ebf68575a63a5453e9aad27a4f24f119e221e94e97409e7a5b574819a4f245c237e18c409e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 2596 msedge.exe 2596 msedge.exe 5088 identity_helper.exe 5088 identity_helper.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2596 4476 rundll32.exe 80 PID 4476 wrote to memory of 2596 4476 rundll32.exe 80 PID 2596 wrote to memory of 4372 2596 msedge.exe 82 PID 2596 wrote to memory of 4372 2596 msedge.exe 82 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 4140 2596 msedge.exe 83 PID 2596 wrote to memory of 3460 2596 msedge.exe 84 PID 2596 wrote to memory of 3460 2596 msedge.exe 84 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85 PID 2596 wrote to memory of 3756 2596 msedge.exe 85
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\MyTorrentDownloader.url1⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.mytorrentdownloader.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc074f46f8,0x7ffc074f4708,0x7ffc074f47183⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:83⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:13⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:13⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:13⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:13⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:13⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:13⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1280 /prefetch:13⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:13⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15590932459967205479,6308605081323332143,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD51f54c879a8bd40819315f74e44e410ef
SHA1dc57d9654a1e55a7e623d70e919c17c8838ac5fc
SHA25672878ef728ec5959cf42ba2922838e8d73e4a01a86a2b6f3ce95bcc578483c96
SHA512dd6ac29ca5b4d83e139f35631201a969ff51c0ed4ffa8ede0d90e67a2edfb308ec7dc7b7ffee83b41ea279273dd626403b372931997682adff8e77a13ea62cbd
-
Filesize
6KB
MD5cd3bcc732941d88f18cdc7bf9f6143e4
SHA179986905c95d336e712979e51445f28574d46c4a
SHA2566c07aeec0fea451928155181aa6d2644a089d81f81cac8e0a34684fb5a9e2843
SHA512d8f7f33cc7d25770b441cd21db255e9ec3a4c481f898d56d920110f32fac652f04fa9738ebbe9f8cfa373b23120c02d5e21cb2d576ab40fc5fa7362124c71aa6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59c55fc3aa044127dd074bab3ad68ce20
SHA178fbdb0fe52ac79bf6ea00e54f69e131d456bdbd
SHA256b6be35265bb714d43fa37f67e27ce6bf5363dbfc0ac4f8832ac6176b3f1f6609
SHA512d477688bf35b37d160a9503d336633b26ddbbc5c99dd02c52cad2a1a4f31452ff4a97a34031ffe2bbb8dbfff4113b605325d3e4cbe81ca80fa0451c6b35ef168