Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
New Bypsss 3.3.exe
Resource
win10v2004-20240802-en
General
-
Target
New Bypsss 3.3.exe
-
Size
1.7MB
-
MD5
d8c63d2d3cda4dbb3f5a0e721f48ee3e
-
SHA1
19507750fd93ccc9852e16fae2d96a39d5dd930d
-
SHA256
6f153f931271f12044fe1b1ed3bb0f700312e921d0629e88358d9ffd60f3c771
-
SHA512
8775af055599867e24e9bcb7a6b709e22aa1c975218d6fff8c3b2e17b45e5a8164e7a7f74d69a90586ea23ae39eeeaf1c4b3584a0f154c36a13ff6492343649b
-
SSDEEP
24576:B55KYALlvlPyjpGo6cMTI7bqYaTfFnIYsCx+VQya+bMR0/WlYpdEOtn:9PilPyGo97uTfys0/LpdEOtn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Bypsss 3.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1604 msedge.exe 1604 msedge.exe 2000 msedge.exe 2000 msedge.exe 4440 identity_helper.exe 4440 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 3948 3520 New Bypsss 3.3.exe 91 PID 3520 wrote to memory of 3948 3520 New Bypsss 3.3.exe 91 PID 3520 wrote to memory of 3948 3520 New Bypsss 3.3.exe 91 PID 3948 wrote to memory of 3328 3948 cmd.exe 92 PID 3948 wrote to memory of 3328 3948 cmd.exe 92 PID 3948 wrote to memory of 3328 3948 cmd.exe 92 PID 3948 wrote to memory of 2880 3948 cmd.exe 93 PID 3948 wrote to memory of 2880 3948 cmd.exe 93 PID 3948 wrote to memory of 2880 3948 cmd.exe 93 PID 3520 wrote to memory of 2000 3520 New Bypsss 3.3.exe 96 PID 3520 wrote to memory of 2000 3520 New Bypsss 3.3.exe 96 PID 2000 wrote to memory of 4032 2000 msedge.exe 97 PID 2000 wrote to memory of 4032 2000 msedge.exe 97 PID 3520 wrote to memory of 3672 3520 New Bypsss 3.3.exe 98 PID 3520 wrote to memory of 3672 3520 New Bypsss 3.3.exe 98 PID 3672 wrote to memory of 1640 3672 msedge.exe 99 PID 3672 wrote to memory of 1640 3672 msedge.exe 99 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 5084 2000 msedge.exe 100 PID 2000 wrote to memory of 1884 2000 msedge.exe 101 PID 2000 wrote to memory of 1884 2000 msedge.exe 101 PID 2000 wrote to memory of 3660 2000 msedge.exe 102 PID 2000 wrote to memory of 3660 2000 msedge.exe 102 PID 2000 wrote to memory of 3660 2000 msedge.exe 102 PID 2000 wrote to memory of 3660 2000 msedge.exe 102 PID 2000 wrote to memory of 3660 2000 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Bypsss 3.3.exe"C:\Users\Admin\AppData\Local\Temp\New Bypsss 3.3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo fuck | clip2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo fuck "3⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\SysWOW64\clip.execlip3⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://shrinke.me/AMXc2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93c7946f8,0x7ff93c794708,0x7ff93c7947183⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:23⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:83⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:13⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:13⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:13⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:13⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:13⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:83⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:13⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:13⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:13⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:13⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:13⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,4385530711715093477,14401713919761802791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:13⤵PID:5812
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/pubgbypasss2⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93c7946f8,0x7ff93c794708,0x7ff93c7947183⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3695352594406658233,16991333600409511464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:23⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,3695352594406658233,16991333600409511464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD597f1c4a5db3dca33e2602d5d9736bc08
SHA1f2649f4579287fb5d09aee03b9d6ca9a8bf3aca8
SHA25623a73b6c969731331ec6c913fd3e18e9efde0b44c5f6854dc2fb3e98190962ec
SHA512cf7b6d73f4d8f6c2ab44da01926c5f2061abf85dbf5eb6b6272e9eabb0760f780f43c5d7a48479746d3a8470720405198ee235ca94f9e04f69f0087f24c286f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5056e43501d8495d27fe7e3b4534abefb
SHA13446c322b2a0d64f313603e235793a1dec33f558
SHA256270282115aa20a6605d2f161c90d76b0cd5135cb8eeda8efc3a40d85e992dec7
SHA512d13679c34f8fc7132945c41e5ef21ee89100dc4759de94cae48bfb55951420fff4038a936c761c62a8a3a908b50b73fccf32c44c1b20ea16cf6017563d0aaa36
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5151113e89456c73be2179d606eb116b0
SHA1894c52ffdd0557227982a3dda1a0e3775a88416a
SHA25620011057d00f46754774ac112ae0702af1e8cb2fa538a1e9922ce984df209c19
SHA51260faf75917689307cd3d0fc30ab3a34ae7029f9e8cd58ac23f11a9a13698d7a60c161ad3cff77432239a08fe2ddd41c86c994ea791d17c6289c5f89b068a21f6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD50a96db8e361fb235f4de3cc761dd9a09
SHA15cb361ffdfadc98bd87d09ff00809c2ee8db9805
SHA256f7b8e3b2fccaa0834adbb0d08b75942ff091216cd63ffbd7ec3242cc71fd62a8
SHA512d270fa5cd166b2971a4c1bb45e9174a3fe8f4f58a4f18dba33dc43a94ebc868280447003f2dd9060537609a9393c55c6394e9fc30c38f1c1074cbcd4e1102f16
-
Filesize
8KB
MD5d9bdd9ba2e2d88aa39257136f9235919
SHA1925ddccd8717ed58b16a28d9cbd73355b1b32648
SHA2569110a7aa87d4582fd419b3dfc456c84b73d67893f8341061f9d1d5b72ddc23c9
SHA51219b345c1056a0220ccb6d68610a202e3adfe1b70ca7ad812cbabaa98566a3cd1bf298b2a435f093f00aef65408dc93a23a0471f987a56569ca00de4d5c499068
-
Filesize
5KB
MD58656ac6c0bf49833bff22f0a3bd385f2
SHA13892a97a4ed6dd22a660a6f7c9f53c06cfc8e2a4
SHA2569a245b5eb891bf8cf727869df913a0c32b0098e743d85cbc78500cc413aae87f
SHA5125a715608923060406432937b006f4080022a636efb4bd49002365c02b49ef39bd9565188bf3c7b5c7f1af592b10d2e5cc81aed0b07756fbf917beb535a6e67c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f00565f60affe7e305e075482dd936f5
SHA158c4dffdd73590855982db6f384980542684ac08
SHA25686be2ecd75247bafe1e631793005ea203877e1b3f34e313664149c1ddd85805b
SHA512b7b7c4dd8f385c7a97cd3fe6e4eeea3feaf4836d3613a63523ac8ef11fd282373f4fd9238559e8a02b50cb2d8dd520d7bc585d992cd8cd45def8df3fda6df0c3
-
Filesize
8KB
MD5760afc8b22bedce3f5c377e82a219ed9
SHA1835fba56021919f64f473b24b570c31cd2cdaf8d
SHA2564ce4952c69091e3f23a95c029c11398d9e288f9cfdd82720e2f2797509699cca
SHA512b00883b3782f46006ea466f3a3103fc8eae4cfd798ecd641e66cc6d87dcc1c43c7620ff4ed33d02ba6d9fb21f825312f5e2c7018896d31807817b01a281a2482
-
Filesize
79B
MD583c5f9890dd9ffa034f78d071480a2af
SHA1767e71bd39d407e75707b899076b597ab7a32d9d
SHA256f2c758d3b3d6fd552aa1b48fcd0cbbce4b6be8e8f2862a6036eb668eaae4c4c8
SHA512ab2dde4996ac29d807d11278cf0b401c487e502b1d6142b662ba1853cd882c338d879b24d1c6fe71fc17ad309d684057f747b2de5a7a9b33e1a905190c98236a
-
Filesize
80B
MD53df151c6a1a1f8d5ddcc268d20e2b0a0
SHA133916d6b8244ae3f87fca096f32ba4d1b285cf46
SHA2568f54de06f8e109ca7c91e051e4eb8d98cb2d19b61a7db8f793d2b55eaba70a9d
SHA5129eab92d6bd6c19116b0a2e1b29a006ef16b7931a53827e294d6b782b6606f8fa4f784d7d3607b35b2b41526890cec4b8c0781d096bda23ede9bc4d4d8a45dc8b