Overview
overview
3Static
static
3Release/CeleryApp.exe
windows11-21h2-x64
1Release/bi...sample
windows11-21h2-x64
3Release/bi...sample
windows11-21h2-x64
3Release/bi...sample
windows11-21h2-x64
3Release/bi...sample
windows11-21h2-x64
3Release/bi...sample
windows11-21h2-x64
3Release/bi...sample
windows11-21h2-x64
3Release/bi...ain.js
windows11-21h2-x64
3Release/bi...bap.js
windows11-21h2-x64
3Release/bi...pex.js
windows11-21h2-x64
3Release/bi...cli.js
windows11-21h2-x64
3Release/bi...bat.js
windows11-21h2-x64
3Release/bi...igo.js
windows11-21h2-x64
3Release/bi...ure.js
windows11-21h2-x64
3Release/bi...fee.js
windows11-21h2-x64
3Release/bi...cpp.js
windows11-21h2-x64
3Release/bi...arp.js
windows11-21h2-x64
3Release/bi...csp.js
windows11-21h2-x64
3Release/bi...css.js
windows11-21h2-x64
3Release/bi...art.js
windows11-21h2-x64
3Release/bi...ile.js
windows11-21h2-x64
3Release/bi...ecl.js
windows11-21h2-x64
3Release/bi...arp.js
windows11-21h2-x64
3Release/bi.../go.js
windows11-21h2-x64
3Release/bi...hql.js
windows11-21h2-x64
3Release/bi...ars.js
windows11-21h2-x64
3Release/bi...hcl.js
windows11-21h2-x64
3Release/bi...tml.js
windows11-21h2-x64
3Release/bi...ini.js
windows11-21h2-x64
3Release/bi...ava.js
windows11-21h2-x64
3Release/bi...ipt.js
windows11-21h2-x64
3Release/bi...lia.js
windows11-21h2-x64
3Analysis
-
max time kernel
9s -
max time network
14s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-07-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
Release/CeleryApp.exe
Resource
win11-20240704-en
Behavioral task
behavioral2
Sample
Release/bin/Monaco/.git/hooks/applypatch-msg.sample
Resource
win11-20240704-en
Behavioral task
behavioral3
Sample
Release/bin/Monaco/.git/hooks/commit-msg.sample
Resource
win11-20240704-en
Behavioral task
behavioral4
Sample
Release/bin/Monaco/.git/hooks/fsmonitor-watchman.sample
Resource
win11-20240704-en
Behavioral task
behavioral5
Sample
Release/bin/Monaco/.git/hooks/post-update.sample
Resource
win11-20240704-en
Behavioral task
behavioral6
Sample
Release/bin/Monaco/.git/hooks/pre-applypatch.sample
Resource
win11-20240704-en
Behavioral task
behavioral7
Sample
Release/bin/Monaco/.git/hooks/pre-commit.sample
Resource
win11-20240704-en
Behavioral task
behavioral8
Sample
Release/bin/Monaco/package/dev/vs/base/worker/workerMain.js
Resource
win11-20240704-en
Behavioral task
behavioral9
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/abap/abap.js
Resource
win11-20240704-en
Behavioral task
behavioral10
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/apex/apex.js
Resource
win11-20240704-en
Behavioral task
behavioral11
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/azcli/azcli.js
Resource
win11-20240508-en
Behavioral task
behavioral12
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/bat/bat.js
Resource
win11-20240704-en
Behavioral task
behavioral13
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/cameligo/cameligo.js
Resource
win11-20240704-en
Behavioral task
behavioral14
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/clojure/clojure.js
Resource
win11-20240704-en
Behavioral task
behavioral15
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/coffee/coffee.js
Resource
win11-20240704-en
Behavioral task
behavioral16
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/cpp/cpp.js
Resource
win11-20240704-en
Behavioral task
behavioral17
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/csharp/csharp.js
Resource
win11-20240704-en
Behavioral task
behavioral18
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/csp/csp.js
Resource
win11-20240704-en
Behavioral task
behavioral19
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/css/css.js
Resource
win11-20240508-en
Behavioral task
behavioral20
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/dart/dart.js
Resource
win11-20240704-en
Behavioral task
behavioral21
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/dockerfile/dockerfile.js
Resource
win11-20240704-en
Behavioral task
behavioral22
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/ecl/ecl.js
Resource
win11-20240508-en
Behavioral task
behavioral23
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/fsharp/fsharp.js
Resource
win11-20240704-en
Behavioral task
behavioral24
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/go/go.js
Resource
win11-20240704-en
Behavioral task
behavioral25
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/graphql/graphql.js
Resource
win11-20240704-en
Behavioral task
behavioral26
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/handlebars/handlebars.js
Resource
win11-20240704-en
Behavioral task
behavioral27
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/hcl/hcl.js
Resource
win11-20240704-en
Behavioral task
behavioral28
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/html/html.js
Resource
win11-20240704-en
Behavioral task
behavioral29
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/ini/ini.js
Resource
win11-20240704-en
Behavioral task
behavioral30
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/java/java.js
Resource
win11-20240704-en
Behavioral task
behavioral31
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/javascript/javascript.js
Resource
win11-20240508-en
Behavioral task
behavioral32
Sample
Release/bin/Monaco/package/dev/vs/basic-languages/julia/julia.js
Resource
win11-20240704-en
General
-
Target
Release/CeleryApp.exe
-
Size
8.8MB
-
MD5
d2a7e4f3b8fdc023e6579c35e5e83769
-
SHA1
43ce10ac8a1c9423cd70991bbb92c7ad9632cb2c
-
SHA256
43f78f751afc09617b735d086c6855471e34d6ca78a6a862b6448bf67a8f0faf
-
SHA512
d999132c597ff4c407b5de2c4aa9a39f95e92064680b370fb9e6966e1af0726fdd063d8e15e29fda370b163d71ead9da7d103fb36e37a2388432fb18ae47193a
-
SSDEEP
98304:zQgLIRfyC7egWJ3iJzdjf4fwraOWcD9XdMPABIw/t6KHDicVwzUs7o:zQguhegD4fJOWs9XNBZ16M2cuU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\shell CeleryApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\shell\open CeleryApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player CeleryApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\ = "URL:roblox-player" CeleryApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\URL Protocol CeleryApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\DefaultIcon CeleryApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Release\\rstrap.exe,1" CeleryApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox-player\shell\open\command CeleryApp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 msedgewebview2.exe 2676 msedgewebview2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 3056 msedgewebview2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3056 3912 CeleryApp.exe 81 PID 3912 wrote to memory of 3056 3912 CeleryApp.exe 81 PID 3056 wrote to memory of 4904 3056 msedgewebview2.exe 82 PID 3056 wrote to memory of 4904 3056 msedgewebview2.exe 82 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 1476 3056 msedgewebview2.exe 83 PID 3056 wrote to memory of 2676 3056 msedgewebview2.exe 84 PID 3056 wrote to memory of 2676 3056 msedgewebview2.exe 84 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85 PID 3056 wrote to memory of 1268 3056 msedgewebview2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release\CeleryApp.exe"C:\Users\Admin\AppData\Local\Temp\Release\CeleryApp.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=3912.2160.49835915455960700242⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1b4,0x7ffd3dfd3cb8,0x7ffd3dfd3cc8,0x7ffd3dfd3cd83⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:23⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2228 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2476 /prefetch:83⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1876,12364254256923198784,12247144815265350052,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\EBWebView" --webview-exe-name=CeleryApp.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:13⤵PID:3000
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c0bff035a817776b5713498fc8b847e3
SHA11f3105edf5f6a7bb5034977e841044f2bdb7cfc2
SHA256aa4ffc55656ba0ca65a12d06dbac749bd67bc661add0d462f2b6e6ca4372b87a
SHA512cfcbd7d9bd390419338baa65101d4260a8b9da756adc3656c1c67fc6bb298d689cbc04c0f1d8fc01e6662ab5715f8c4ea2ce9ff138b03e0aaeed49db7a634f17
-
Filesize
152B
MD588efa95025be647c09bb35c3357db1b5
SHA182680e4e05c32c428947b9c672c8e43de6ef683e
SHA256281fd6325efcebcdb3182520f0f7445df1a480a96719b8530714599f42719851
SHA5120248ebfd32530ab6580ad1e8109cfdcdf577c770cc00a3f3ef7e674086d3a03497015fe1bd3e592e04ee136e2878e3c2e0286d8264f9f4c4a0913fd34fc87b8a
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23