Overview
overview
10Static
static
10PlutoReape...MS.exe
windows7-x64
10PlutoReape...MS.exe
windows10-2004-x64
10PlutoReape...V2.exe
windows7-x64
3PlutoReape...V2.exe
windows10-2004-x64
3PlutoReape...on.dll
windows7-x64
1PlutoReape...on.dll
windows10-2004-x64
1PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
6PlutoReape...n.html
windows10-2004-x64
6PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...e.html
windows7-x64
3PlutoReape...e.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...ics.js
windows7-x64
3PlutoReape...ics.js
windows10-2004-x64
3PlutoReape...rap.js
windows7-x64
3PlutoReape...rap.js
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 20:19
Behavioral task
behavioral1
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/Dox_Tool_V2.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/Dox_Tool_V2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/Newtonsoft.Json.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/adobe/login.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/adobe/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/badoo/login.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/badoo/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/gitlab/login.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/gitlab/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win10v2004-20250217-en
General
-
Target
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
-
Size
80KB
-
MD5
3ef789263e6a75cdc13166386ecebbb3
-
SHA1
24dc10d9381d31f83a807cd9a37547c50285e99e
-
SHA256
5e368070a41124048a88accb87b8576e5f32676d6cc6057748e2ba6e5774ed81
-
SHA512
ceb6ab6021f107ccd0d93bc67589f8ee0604130022fc2d87391f1487797745e28eb777cef03bbe8d2a42cbd320883420e524320ebbd4d225eab5fbf6badeb1f7
-
SSDEEP
1536:MmMAXA6ILKIHkVBV7p1jLnt28lM3onCFzB/OGYdOf+Z+lkQC6Ujkm:1XA6Oj8qYY2GYoRUjkm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 2316 msedge.exe 2316 msedge.exe 2388 identity_helper.exe 2388 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 688 2316 msedge.exe 86 PID 2316 wrote to memory of 688 2316 msedge.exe 86 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 1740 2316 msedge.exe 87 PID 2316 wrote to memory of 4384 2316 msedge.exe 88 PID 2316 wrote to memory of 4384 2316 msedge.exe 88 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89 PID 2316 wrote to memory of 2808 2316 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\PlutoReaper\PlutoReaperV2\PROGRAMS\PHISHING\google\login.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0b0c46f8,0x7fff0b0c4708,0x7fff0b0c47182⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6037439153587870847,6175004888216721842,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
460B
MD58231e78b2c1af64ac20a6966da4aa0f0
SHA1b0baf16d9875fe1d513773d98fe238b9f7c9f4d5
SHA2568adce5bde3aa56477beb2f57d7337bb0bda768a4880982ceee114e9b629133ee
SHA512fc44cd46a0093527b4f6708ab3bab69f1ed269ab297f82a924642a011362ced7e7c2d4bce03d4ca6a318a6c118633b80beee59db7db0a2a82809bc2cb81cca68
-
Filesize
5KB
MD510385e20a5db2adb44f090d38ec07dcc
SHA1ac3c1874024cf517f48caedcc377088c522fb391
SHA256219b159ec6e561330273b308adf5240afee535d3f0a098c9ce79ec7e6a544292
SHA512cbf16c7af6a924c8f1615213ba74b495b90dee4ade3c0b1a3aa04a88a86eb710139ad9887de1d56506e9a231ee40c373dec366bf9c836245595aee3e4290e524
-
Filesize
6KB
MD51c64b4709dbc15238799400936105fde
SHA159a2cab43785c1ae885cda14e8aceb203e4ed7bc
SHA2564527b16b5fc4a7ec7cb9f2353ba4b5a89b92e406a3e8f534624006fd6b11bd11
SHA512fd46f82681d949c89333bd74e5b6939942404c4f3867904456de97d741968187043fa52ec02086123ac2a1e96f1b204ec56c047be5ba7f74b957be5d8bf82962
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e77c97888782f5b1e7e922ca5a1beccf
SHA10281c03a9aa1263f305e6649fb7c3b82eb1497a5
SHA2563c65a188e14a9446a10c4a8a4fe948054eebb04790a25c858772b342f8875472
SHA512f88245df84cb81d6d19fc799db310262abc0bd8ae143d9eb8a6cd8238dfe6d9a02ea15aa0da5685647ccdd3e37109e0486b6994a62ad87e4bdc3304dc08e5ca0