Analysis
-
max time kernel
213s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 03:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/zt8seauujqiho1q/Palm_Bootstrapper.exe/file
Resource
win10v2004-20240802-en
General
-
Target
https://www.mediafire.com/file/zt8seauujqiho1q/Palm_Bootstrapper.exe/file
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2680 msedge.exe 2680 msedge.exe 5316 identity_helper.exe 5316 identity_helper.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 216 2680 msedge.exe 86 PID 2680 wrote to memory of 216 2680 msedge.exe 86 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2532 2680 msedge.exe 87 PID 2680 wrote to memory of 2712 2680 msedge.exe 88 PID 2680 wrote to memory of 2712 2680 msedge.exe 88 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89 PID 2680 wrote to memory of 2716 2680 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/zt8seauujqiho1q/Palm_Bootstrapper.exe/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb95f46f8,0x7ffbb95f4708,0x7ffbb95f47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 /prefetch:82⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6888 /prefetch:12⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:12⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7132 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7248 /prefetch:82⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18166315179987927054,15968434617057455049,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5dc74ad7389e729f575b25b5518f89504
SHA16f2c4e569b7ab1a8162da81040da8a8bd50b10ac
SHA256e3b6d9708aafc39e17363ecd23806f49dbe4688b153e365b9bd9ec40a5393cb1
SHA512ee2e6443ee81d7114a2bba7c911612f435b56403e97a21419245e9ec9f6e7b150915681a946b8d87a92622c36e71bc61c85b5c335fadadfd17129534c7615406
-
Filesize
8KB
MD53087049d4148ff00bfa48c03421dec4f
SHA155a3cac82ee36d724d2c695eac971077d154e6c9
SHA25629d61b57a559deae9146ae1cd61bd95adda6b0b315c3a7d7e660d78f1e2ae85f
SHA51236afc0b3a768fcfb2a4396a56d9f06ee31f3506f5180f4ccc82835ee226d774ee1df9576712c3f4fb86a9e73534c507291b71db02c7769a1c148de0fde0b1417
-
Filesize
6KB
MD5821fa6eed07ebef9a9b8fe04a958144e
SHA11b72c1847fb97b67dd8f081e6c79f7fa0fbbb391
SHA2563392165766c7cd381c7ae66168cc47b0d1fa107a7fb71db0c0f933b3adcbca9e
SHA512817c7c061f9d82d797b4452ca2082d90b27258a07fe63c4ff9d5ad714392294e0a9610ed925adc43b96edcdaef22bd541468522a1e63ce996a1a265b59f96ef1
-
Filesize
10KB
MD57195d11e65b9089b06cd2ec853d18b33
SHA1e51b10fcbcd44c9d29cb2ab43604344d3d0be0b2
SHA2562cc932e22e095534d216d608d6418bf1471e46d8eb3dbddc0858f3afe8303836
SHA5127d1dd768b18569cc3c759b7a64389d237dbdd1a5e82bd39d6e708a9018136f0c2dab5446d00067cce6efc9cb986226e3a248e2fabb577f6d80d7f79ad2878831
-
Filesize
11KB
MD5a284c2fa2947c0d09da3f4c3a971a768
SHA1c1a42488a443585c6e0663da7dac8706db1e214b
SHA256502e900840155a0d51162f9d59305491ed587555d0e10c80861c154d8bf206c4
SHA51280f29b4154fd0ebccb458ed7f4e00efc8ee14710200f9245c3e708b1c324b8cb3347eac51919bb4ea75333680afa82aceb2357255c649a91dca34f753c1f3fed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD566a6037225721525f4821301bea79d35
SHA103c7760a21cbe783923225f9a506d087a2498e2e
SHA256dfbfa69b8678d1d03205c3ec4a960a64e2eabb5b0fde4883f251052ab877742f
SHA5123d3d4257d59f492ed03327d84a1577355680d9b719b43f1712d011adc7a980dfbd73932c20de9d9ed2a7a46d76accf05f1e159ff33997ff8d6d23285a28c3dd4
-
Filesize
11KB
MD5d7342f7c3c54b6fff5009ba9d1bcc0c9
SHA13d444ecc2a09a2e0b900892951363abc14deb71b
SHA256866d348686bef846f91f8cde3db274e0b6a6a952e6063048102832304fba4b29
SHA512ab72781f8b3cfa38176c1c88e6a7fe7d11e24800d2f8c2865172183dbed4787709b95b25f769e65c812efa8abdd79ccc208b24b3a7b36ef86e653ecb5d9f04a9