Overview
overview
10Static
static
10PlutoReaperV2.rar
windows7-x64
3PlutoReaperV2.rar
windows10-2004-x64
1PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
6PlutoReape...n.html
windows10-2004-x64
6PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...e.html
windows7-x64
3PlutoReape...e.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...ics.js
windows7-x64
3PlutoReape...ics.js
windows10-2004-x64
3PlutoReape...rap.js
windows7-x64
3PlutoReape...rap.js
windows10-2004-x64
3PlutoReape...ery.js
windows7-x64
3PlutoReape...ery.js
windows10-2004-x64
3PlutoReape...002.js
windows7-x64
3PlutoReape...002.js
windows10-2004-x64
3PlutoReape...003.js
windows7-x64
3PlutoReape...003.js
windows10-2004-x64
3PlutoReape...004.js
windows7-x64
3PlutoReape...004.js
windows10-2004-x64
3PlutoReape...005.js
windows7-x64
3PlutoReape...005.js
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 20:06
Behavioral task
behavioral1
Sample
PlutoReaperV2.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
PlutoReaperV2.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_002.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_002.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_003.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_003.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_004.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_004.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_005.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_005.js
Resource
win10v2004-20250217-en
General
-
Target
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
-
Size
80KB
-
MD5
3ef789263e6a75cdc13166386ecebbb3
-
SHA1
24dc10d9381d31f83a807cd9a37547c50285e99e
-
SHA256
5e368070a41124048a88accb87b8576e5f32676d6cc6057748e2ba6e5774ed81
-
SHA512
ceb6ab6021f107ccd0d93bc67589f8ee0604130022fc2d87391f1487797745e28eb777cef03bbe8d2a42cbd320883420e524320ebbd4d225eab5fbf6badeb1f7
-
SSDEEP
1536:MmMAXA6ILKIHkVBV7p1jLnt28lM3onCFzB/OGYdOf+Z+lkQC6Ujkm:1XA6Oj8qYY2GYoRUjkm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 3556 msedge.exe 3556 msedge.exe 4804 identity_helper.exe 4804 identity_helper.exe 5484 msedge.exe 5484 msedge.exe 5484 msedge.exe 5484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3556 wrote to memory of 1548 3556 msedge.exe 86 PID 3556 wrote to memory of 1548 3556 msedge.exe 86 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 4832 3556 msedge.exe 87 PID 3556 wrote to memory of 5012 3556 msedge.exe 88 PID 3556 wrote to memory of 5012 3556 msedge.exe 88 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89 PID 3556 wrote to memory of 3528 3556 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\PlutoReaper\PlutoReaperV2\PROGRAMS\PHISHING\google\login.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf68946f8,0x7ffcf6894708,0x7ffcf68947182⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,5144821278799025401,10306364002559959698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
460B
MD56ecfb52f6f2fc40af2d7517ec5adbb31
SHA18eee1878ceda30776daa994f0b116ad269cdfb88
SHA256573b25fe2b8eb383429d1ac064683fb32db8faddbf8332d20d7b186e39bbb19d
SHA512cf0684044871f426435472637c13fcf9ab168406ec6c03c7ae2e99c6609906b095cb5f60df256c8424be2418e679786a4f50de3ddb647a6e7206345b18baaf2f
-
Filesize
6KB
MD57c74cf0f8969a05207286f9c330ba133
SHA12f9b4269fdd5f9f1687f52748355b5c34932c9f0
SHA256dcb609db8d923b579a5d0bea2c893ed378e596415076e72e3e8bf43bf9556c40
SHA512a663ff18dae10e1970a04ac7763ac924e3b8d70c4020d96fbf4ff9d18b09fbb4a5afb0583f5015287f391fd3a71a3337d58fa7479c43465aaedd8a6b32583f60
-
Filesize
5KB
MD53410c7cdeca93e741b70a712744d018b
SHA1ca77f6d3249d68a5b278a9e1fc9ae75c10b0ed4b
SHA256079413aa2d6b78a1e460ca7354a4c2cbda50fe30bb772040aff68d58ac799463
SHA512911bd0b8af4b17b6b03652492366fd0c8ffe2601005e5b0719f4a0ea231b54bef90cb77cc910667de61462b531e83e210781d975e9980eb0fec61ba6b08dd817
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e1676c7440f54b3cc7bbebb3e66fc155
SHA1783264d395f61f51077a9a1f8d7996dbb639642b
SHA256ecd4296dba14080f0aeea1fb49edcde0fe2c65540f6bcd061e85aa989ed3084f
SHA5121f12014cf108cc5a5f0a119c8ea0b51a4c270698a8a70ccbf8feaa43fb60c52d93a26efad459e1c704d7cc44a9d7b3a2b29d2ccd62f92a1e497c0c29ac0fc04c