Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 22:24
Behavioral task
behavioral1
Sample
Program+AV.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Program+AV.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Program+NoAV.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Program+NoAV.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Program-AV.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Program-AV.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Program-NoAV.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Program-NoAV.exe
Resource
win10v2004-20240709-en
General
-
Target
Program-NoAV.exe
-
Size
2.1MB
-
MD5
e4d01f16508ca1f67ba00a98a42fa2ff
-
SHA1
0654d678a97da50a9838c20c23d4ff82e3952e34
-
SHA256
f9412ae2c48400f464de1b60d2b290ba00cf62073df1bc6dec1272915a1aed39
-
SHA512
61ad4ddbf24213e29b3710a0f5279eef8a0011b61097c9a3484cef00405be06f9068767f5049dc81e02b523a85aa834e4753d7d59d2ad804c1e4a8c8a8ffb8a1
-
SSDEEP
49152:/5dVwPaFHTTgkAAn2IQ39y9rRF8HIyOisq:RdW4lQw5RF8/
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Program-NoAV.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Program-NoAV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Program-NoAV.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Program-NoAV.exedescription pid Process procid_target PID 904 set thread context of 2040 904 Program-NoAV.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
Processes:
Program-NoAV.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D2A3105-81F1-9565-BAA6-C0777B43DEEB} Program-NoAV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D2A3105-81F1-9565-BAA6-C0777B43DEEB}\ = "SlideshowContextMenu" Program-NoAV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D2A3105-81F1-9565-BAA6-C0777B43DEEB}\InProcServer32 Program-NoAV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D2A3105-81F1-9565-BAA6-C0777B43DEEB}\InProcServer32\ = "%SystemRoot%\\SysWow64\\stobject.dll" Program-NoAV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D2A3105-81F1-9565-BAA6-C0777B43DEEB}\InProcServer32\ThreadingModel = "Apartment" Program-NoAV.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 5032 msedge.exe 5032 msedge.exe 3676 msedge.exe 3676 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Program-NoAV.exedescription pid Process Token: 33 904 Program-NoAV.exe Token: SeIncBasePriorityPrivilege 904 Program-NoAV.exe Token: 33 904 Program-NoAV.exe Token: SeIncBasePriorityPrivilege 904 Program-NoAV.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Program-NoAV.exeProgram-NoAV.exeProgram-NoAV.exemsedge.exedescription pid Process procid_target PID 1880 wrote to memory of 904 1880 Program-NoAV.exe 84 PID 1880 wrote to memory of 904 1880 Program-NoAV.exe 84 PID 1880 wrote to memory of 904 1880 Program-NoAV.exe 84 PID 1880 wrote to memory of 904 1880 Program-NoAV.exe 84 PID 1880 wrote to memory of 904 1880 Program-NoAV.exe 84 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 904 wrote to memory of 2040 904 Program-NoAV.exe 89 PID 2040 wrote to memory of 3676 2040 Program-NoAV.exe 94 PID 2040 wrote to memory of 3676 2040 Program-NoAV.exe 94 PID 3676 wrote to memory of 3308 3676 msedge.exe 95 PID 3676 wrote to memory of 3308 3676 msedge.exe 95 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 4964 3676 msedge.exe 96 PID 3676 wrote to memory of 5032 3676 msedge.exe 97 PID 3676 wrote to memory of 5032 3676 msedge.exe 97 PID 3676 wrote to memory of 3840 3676 msedge.exe 98 PID 3676 wrote to memory of 3840 3676 msedge.exe 98 PID 3676 wrote to memory of 3840 3676 msedge.exe 98 PID 3676 wrote to memory of 3840 3676 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Program-NoAV.exe"C:\Users\Admin\AppData\Local\Temp\Program-NoAV.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Program-NoAV.exe"C:\Users\Admin\AppData\Local\Temp\Program-NoAV.exe"2⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\Program-NoAV.exeC:\Users\Admin\AppData\Local\Temp\Program-NoAV.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=Program-NoAV.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e4346f8,0x7ffb3e434708,0x7ffb3e4347185⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:25⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:85⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:15⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 /prefetch:85⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:15⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:15⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:15⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:15⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:15⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:15⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10668396152332715748,388145842052197925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=Program-NoAV.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:1920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e4346f8,0x7ffb3e434708,0x7ffb3e4347185⤵PID:3652
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5177182e34880f86da366e665c824b780
SHA1c636d56206d9a0b0166eff5befe1af1d66906c73
SHA2567529c4fff2a560956e3a5759c8a987e6b2f48ce437625eb9739167fa2c875eea
SHA512627dce26493e22817e96faaaf34672af1bb66b456ee295a987ef4539e3af244c8e8f2fe6867074532e869bf29dbd9e54d637a31e55cb1c8d87f9aa405c2bca38
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD52e9cf867fd88a8631f1c0eb1480a6ffa
SHA1681a076d8e04f10cbc8962c2f6e7f3414792acbd
SHA256bf1cca4da3e1f379a26f8c59c273cd5eea57c1d3f6da32c3fd595b6b159cd821
SHA51284c298081febaf545d844bd1283b1995e8622efa53577bb43d1be29c6b0f04ed64488fd9c3c20177c7e6e436f7d26da1349b4863a3e83fc79592065c08c44948
-
Filesize
6KB
MD5bd9caf198fb2ffc3191f354b545f4a73
SHA1535829acfa25a1d337a56c9e39752433f36d2dff
SHA25645c8ffe32c3d8978aa31ae38c8d7920c74ff342e9273ad01a402fa72e6bacebe
SHA5128adba5f599c95c1742f247a623af07c9f57266fe48b246fa2d04ffa789817f84512a29e09534406bff1fb599a1f9a2e3dae0d548d9957403e99637f6a20c03e8
-
Filesize
371B
MD5f21bc1474c41cc46fa981258aa2c912b
SHA17a789998974e76684f95d81f2e827263e32309a6
SHA25675dc828485343023ff976fe4b5cdb39ccf50178359115cec3162cdd66152b388
SHA512e4a38f2296dfad68f697e0da78e862fe255633dd710aaf3f70b5d5b7df9a520f0c13c3df25557929913ccdf4040df8fa17fafc528f712d31bc13b5542e33c282
-
Filesize
371B
MD56b2c189f1df73f7e5a7c9aefc1781063
SHA17ae05708564b2c70f66d260ad534a970965bef29
SHA256940c7b2a8435dde7bcb4d133e4bf3d75d9e9ad391fbcc42c560f816f6f82a17b
SHA5126fe4016a187523539870e5e647634815eadfb519dd14c403f3f6ff4a77f761d437b5589997956461ec822a9294508f1516aef7b94b330a3fcfb2f4a70cfc46be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a3db13a862a594d79f659ac843f59f03
SHA1ff6a57409d3296d1f8423f37ddb81ca2bfbad366
SHA25664b0adc3775fc8993b6bb7f4d63acd0eb0b6628509101a9546bfb43192cf58cd
SHA512579755cff0611e674b28dcfc8025b58edd62bc779d014a73b6ec625ae34310a045ebf9d12a5a5be45238dc975cad9ffb2ee5e02c80699712ddce428e703ffc59
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e