Overview
overview
10Static
static
10RobloxShad...up.exe
windows7-x64
10RobloxShad...up.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
10LICENSES.c...m.html
windows10-2004-x64
10RblxShdrSetup.exe
windows7-x64
1RblxShdrSetup.exe
windows10-2004-x64
6d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...pi.dll
windows7-x64
1resources/...pi.dll
windows10-2004-x64
1resources/...e3.dll
windows7-x64
1resources/...e3.dll
windows10-2004-x64
1resources/...act.js
windows7-x64
3resources/...act.js
windows10-2004-x64
3sqlite-aut...llback
ubuntu-18.04-amd64
1sqlite-aut...llback
debian-9-armhf
1sqlite-aut...llback
debian-9-mips
1Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 01:51
Behavioral task
behavioral1
Sample
RobloxShader_Setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
RobloxShader_Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
RblxShdrSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
RblxShdrSetup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/dist/index.js
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/dist/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/prebuilds/win32-x64/node.napi.dll
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/prebuilds/win32-x64/node.napi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral31
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral32
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-mipsbe-20240611-en
General
-
Target
LICENSES.chromium.html
-
Size
8.7MB
-
MD5
1ca87d8ee3ce9e9682547c4d9c9cb581
-
SHA1
d25b5b82c0b225719cc4ee318f776169b7f9af7a
-
SHA256
000ae5775ffa701d57afe7ac3831b76799e8250a2d0c328d1785cba935aab38d
-
SHA512
ec07b958b4122f0776a6bded741df43f87ba0503b6a3b9cc9cbe6188756dcde740122314e0578175123aaa61381809b382e7e676815c20c3e671a098f0f39810
-
SSDEEP
24576:ZQQa6Ne6P5d2WSmwRFXe1vmfpV6k626D6b62vSuSpZ:ZMfTVQ
Malware Config
Signatures
-
Detects RedTiger Stealer 21 IoCs
resource yara_rule behavioral12/files/0x0007000000023d22-21.dat redtigerv122 behavioral12/files/0x0007000000023d22-21.dat redtigerv22 behavioral12/files/0x0007000000023d22-21.dat redtiger_stealer_detection behavioral12/files/0x0007000000023d22-21.dat redtiger_stealer_detection_v2 behavioral12/files/0x0007000000023d22-21.dat staticSred behavioral12/files/0x0007000000023d22-21.dat staticred behavioral12/files/0x0007000000023d22-21.dat redtiger_stealer_detection_v1 behavioral12/files/0x0008000000023d61-52.dat redtigerv122 behavioral12/files/0x0008000000023d61-52.dat redtigerv22 behavioral12/files/0x0008000000023d61-52.dat redtiger_stealer_detection behavioral12/files/0x0008000000023d61-52.dat redtiger_stealer_detection_v2 behavioral12/files/0x0008000000023d61-52.dat staticSred behavioral12/files/0x0008000000023d61-52.dat staticred behavioral12/files/0x0008000000023d61-52.dat redtiger_stealer_detection_v1 behavioral12/files/0x0007000000023d65-60.dat redtigerv122 behavioral12/files/0x0007000000023d65-60.dat redtigerv22 behavioral12/files/0x0007000000023d65-60.dat redtiger_stealer_detection behavioral12/files/0x0007000000023d65-60.dat redtiger_stealer_detection_v2 behavioral12/files/0x0007000000023d65-60.dat staticSred behavioral12/files/0x0007000000023d65-60.dat staticred behavioral12/files/0x0007000000023d65-60.dat redtiger_stealer_detection_v1 -
Lunagrabber family
-
Matches Luna Grabber Rule For Entry 2 IoCs
Detects behavior indicative of Luna Grabber malware
resource yara_rule behavioral12/files/0x0007000000023d22-21.dat LunaGrabber behavioral12/files/0x0007000000023d65-60.dat LunaGrabber -
Redtiger family
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 4448 msedge.exe 4448 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4936 4448 msedge.exe 81 PID 4448 wrote to memory of 4936 4448 msedge.exe 81 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3940 4448 msedge.exe 83 PID 4448 wrote to memory of 3940 4448 msedge.exe 83 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84 PID 4448 wrote to memory of 3484 4448 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe18f46f8,0x7fffe18f4708,0x7fffe18f47182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,272431020696906535,8292701716785049432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
5KB
MD5da89a256ef50562b6502b63c387894c6
SHA1d826857a6bf5d61c15d31b2fd77a3bbb44987544
SHA256e9a734532d3ec87d71fde562f476b088adcf7c48d6570148c5cc56cba940e739
SHA5121eb75c425a22e7eb49d77962f08dc26b2c8b91de58ee4547effc52b3257529efbb122f7123bfc11e14ead7b37188e660224b04502c4faae0d18ecafc77f071bb
-
Filesize
6KB
MD5a46a610c3866050edc70759e80045fd9
SHA1ed04080848c8cb4956309ba5cbda201d6288264f
SHA256fd65f1080334d6ca3e65e28fde00b37c6fbae031132eec8aa8cc77e239b6a365
SHA512294cb0bfecacf006067cfe61d5a1debc1e457d71ec88c614e00c7e38a3a23dbd7030c456ce8316cf03e9daa70c2699e4735246c836bbb7699403c1fcc514410b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD534ddfa77571cffd88a774552b1ec039d
SHA1994778968d79021ec9e19ceaf04b2c31ae22767d
SHA25688898464b99366589feea780736a0783a3317f3d520b457cc45bb7935ee8e283
SHA5124bf40843c18e2bb6165da776b61c6b774bc557ded8501d87a51dbc64e7f8bdb4cada1bbef8a07d14d9b7a43e11b8b35b518f01bbdf6de80e134e418086f9e78a