Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
78b3e465c4b...18.exe
windows7-x64
78b3e465c4b...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DTDJ_1.exe
windows7-x64
3DTDJ_1.exe
windows10-2004-x64
3DllPicStr.dll
windows7-x64
3DllPicStr.dll
windows10-2004-x64
3LiveUpdate.exe
windows7-x64
3LiveUpdate.exe
windows10-2004-x64
3ReplaceIAT.dll
windows7-x64
7ReplaceIAT.dll
windows10-2004-x64
7cfClient.exe
windows7-x64
3cfClient.exe
windows10-2004-x64
3unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 17:12
Behavioral task
behavioral1
Sample
8b3e465c4be7304302180504f287797d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b3e465c4be7304302180504f287797d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
DTDJ_1.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
DTDJ_1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
DllPicStr.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
DllPicStr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
LiveUpdate.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
LiveUpdate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ReplaceIAT.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
ReplaceIAT.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
cfClient.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
cfClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
unins000.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
unins000.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
68KB
-
MD5
7907aeadad44a5a79a72f7f9282cbbba
-
SHA1
5aaa99d1317265b928000cebac41b34e621b4a46
-
SHA256
529f357deadbd890613b549f0a1e54468d007550f7b80ab8e5f0799dc99b7edd
-
SHA512
0ac39d0f72812687b34921720b5eb0a76037eea8bc9a87d7efa16af9149f3e37dbbaed42b2d3517b3e2b6b5498983dfd6dac21ae3192e91b3ab0fa0b66444d71
-
SSDEEP
1536:IRhoEXBpnbfRpQmJ/CrweqRECy3lvUyS1vg3XTsJLYKR:IjJ7nbppQmJ/CrMREx1vE1vg3XTsJsKR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5060 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 5060 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5060 Au_.exe 5060 Au_.exe 1596 msedge.exe 1596 msedge.exe 3196 msedge.exe 3196 msedge.exe 1136 identity_helper.exe 1136 identity_helper.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 5060 3940 uninst.exe 86 PID 3940 wrote to memory of 5060 3940 uninst.exe 86 PID 3940 wrote to memory of 5060 3940 uninst.exe 86 PID 5060 wrote to memory of 3196 5060 Au_.exe 94 PID 5060 wrote to memory of 3196 5060 Au_.exe 94 PID 3196 wrote to memory of 3356 3196 msedge.exe 95 PID 3196 wrote to memory of 3356 3196 msedge.exe 95 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 3636 3196 msedge.exe 96 PID 3196 wrote to memory of 1596 3196 msedge.exe 97 PID 3196 wrote to memory of 1596 3196 msedge.exe 97 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98 PID 3196 wrote to memory of 3400 3196 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.552200.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd2fa46f8,0x7ffcd2fa4708,0x7ffcd2fa47184⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:24⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:84⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:14⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:84⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:14⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:14⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:14⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:14⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:14⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:14⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:14⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:14⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,11282291990756077810,13262298138415856186,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
6KB
MD573a7529306993237a17ba2e3c4de63dc
SHA172314b0ace381cd2f5c7d14f11ae6bd5f1a1c001
SHA2569565401331d94c98f38800b40b539c4f467a5889550c68b54183a62bc083bc20
SHA5123e030927314bb46cb60d203de3d1b78bb71985db0440bb591a17fa5bd324ec7ddd2fe171784e7289374c8bcdd833f0815df2071a68c375b8bd6505929db6e65d
-
Filesize
6KB
MD54cb26af6420f5e1c41ebe5f9c134e850
SHA111d32284f317bec2792448958102d0ffeb92d95f
SHA25632dc84d713f25dac0aed24d5a526ff11b8470d546e636c4ef1077a14443acff8
SHA5126b1cd6117db7148bf4efdbbd475b70921534e884db2aa9b8c5d1d59b9fb8624d8fd1e5d53478e8ad9e8937b0bf77291658368ef3dea6da60318d9067184e2898
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5387a4ab44b006bef4baddd41be017234
SHA1c39a68eda28cd65eb975673cc10e8be1952f84ff
SHA256ef79e25f64b860caa6ca65100a805aa70abe03198645b1365ffb0d123b3d462c
SHA512cf50b277244040b9288981682d061a71e19308b0ea9429db5cbbd379b37467ea39aefbb4c351687fbefe613c3e933e63c6761364f390f6c89e21ba1b8a00d983
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
68KB
MD57907aeadad44a5a79a72f7f9282cbbba
SHA15aaa99d1317265b928000cebac41b34e621b4a46
SHA256529f357deadbd890613b549f0a1e54468d007550f7b80ab8e5f0799dc99b7edd
SHA5120ac39d0f72812687b34921720b5eb0a76037eea8bc9a87d7efa16af9149f3e37dbbaed42b2d3517b3e2b6b5498983dfd6dac21ae3192e91b3ab0fa0b66444d71