Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 18:31
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
-
Size
2.3MB
-
MD5
3c55617e6b69330386a0350e9f6aa0b4
-
SHA1
99bff391433cfc610b27f3b2b7ebc3239314f831
-
SHA256
1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94
-
SHA512
46eac86da241ab7b98d449e31111c9da154109b493bf62e807cffcdb43767167c994a165d78ec9a4ce24ea4f64ec76edee39daf9408bad3d6e65b64b1b6b1c28
-
SSDEEP
49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir
Malware Config
Extracted
redline
120723_rc_11
rcam.tuktuk.ug:11290
-
auth_value
3a7b4b38a7116be1f337083fb37de790
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 2164 created 1212 2164 TaskMnr.exe 5 PID 2164 created 1212 2164 TaskMnr.exe 5 PID 2164 created 1212 2164 TaskMnr.exe 5 PID 2164 created 1212 2164 TaskMnr.exe 5 PID 2164 created 1212 2164 TaskMnr.exe 5 PID 2776 created 1212 2776 updater.exe 5 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Octium.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TaskMnr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts TaskMnr.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Octium.exe -
Executes dropped EXE 4 IoCs
pid Process 2336 Octium.exe 2164 TaskMnr.exe 1644 ntlhost.exe 2776 updater.exe -
Loads dropped DLL 4 IoCs
pid Process 2876 AppLaunch.exe 2876 AppLaunch.exe 2336 Octium.exe 1052 taskeng.exe -
resource yara_rule behavioral1/memory/1672-57-0x00000000010F0000-0x0000000001658000-memory.dmp themida behavioral1/memory/1672-98-0x00000000010F0000-0x0000000001658000-memory.dmp themida behavioral1/files/0x002f000000015c3f-116.dat themida behavioral1/files/0x002f000000015c3f-118.dat themida behavioral1/memory/2164-124-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-123-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-122-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-119-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-127-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-126-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-125-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-130-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-147-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/memory/2164-160-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/files/0x002f000000015c3f-183.dat themida behavioral1/memory/2164-186-0x000000013FC00000-0x0000000140BA0000-memory.dmp themida behavioral1/files/0x0009000000015c9f-188.dat themida behavioral1/files/0x0009000000015c9f-189.dat themida behavioral1/files/0x0009000000015c9f-187.dat themida behavioral1/memory/2776-191-0x000000013F080000-0x0000000140020000-memory.dmp themida behavioral1/memory/2776-201-0x000000013F080000-0x0000000140020000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" Octium.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Octium.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TaskMnr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 2336 Octium.exe 2164 TaskMnr.exe 1644 ntlhost.exe 2776 updater.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe TaskMnr.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1596 sc.exe 2632 sc.exe 2008 sc.exe 2580 sc.exe 2240 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = d01d1258efb4d901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 2876 AppLaunch.exe 2876 AppLaunch.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 3036 powershell.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 1112 powershell.exe 2164 TaskMnr.exe 2164 TaskMnr.exe 2776 updater.exe 2776 updater.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe Token: SeDebugPrivilege 2876 AppLaunch.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeShutdownPrivilege 2644 powercfg.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeShutdownPrivilege 2440 powercfg.exe Token: SeShutdownPrivilege 2160 powercfg.exe Token: SeShutdownPrivilege 2616 powercfg.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 1672 wrote to memory of 2876 1672 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 28 PID 2876 wrote to memory of 2336 2876 AppLaunch.exe 32 PID 2876 wrote to memory of 2336 2876 AppLaunch.exe 32 PID 2876 wrote to memory of 2336 2876 AppLaunch.exe 32 PID 2876 wrote to memory of 2336 2876 AppLaunch.exe 32 PID 2876 wrote to memory of 2164 2876 AppLaunch.exe 33 PID 2876 wrote to memory of 2164 2876 AppLaunch.exe 33 PID 2876 wrote to memory of 2164 2876 AppLaunch.exe 33 PID 2876 wrote to memory of 2164 2876 AppLaunch.exe 33 PID 2336 wrote to memory of 1644 2336 Octium.exe 34 PID 2336 wrote to memory of 1644 2336 Octium.exe 34 PID 2336 wrote to memory of 1644 2336 Octium.exe 34 PID 820 wrote to memory of 2580 820 cmd.exe 39 PID 820 wrote to memory of 2580 820 cmd.exe 39 PID 820 wrote to memory of 2580 820 cmd.exe 39 PID 820 wrote to memory of 2240 820 cmd.exe 40 PID 820 wrote to memory of 2240 820 cmd.exe 40 PID 820 wrote to memory of 2240 820 cmd.exe 40 PID 820 wrote to memory of 2632 820 cmd.exe 42 PID 820 wrote to memory of 2632 820 cmd.exe 42 PID 820 wrote to memory of 2632 820 cmd.exe 42 PID 820 wrote to memory of 1596 820 cmd.exe 41 PID 820 wrote to memory of 1596 820 cmd.exe 41 PID 820 wrote to memory of 1596 820 cmd.exe 41 PID 820 wrote to memory of 2008 820 cmd.exe 43 PID 820 wrote to memory of 2008 820 cmd.exe 43 PID 820 wrote to memory of 2008 820 cmd.exe 43 PID 2680 wrote to memory of 2644 2680 cmd.exe 48 PID 2680 wrote to memory of 2644 2680 cmd.exe 48 PID 2680 wrote to memory of 2644 2680 cmd.exe 48 PID 2680 wrote to memory of 2440 2680 cmd.exe 49 PID 2680 wrote to memory of 2440 2680 cmd.exe 49 PID 2680 wrote to memory of 2440 2680 cmd.exe 49 PID 2680 wrote to memory of 2160 2680 cmd.exe 50 PID 2680 wrote to memory of 2160 2680 cmd.exe 50 PID 2680 wrote to memory of 2160 2680 cmd.exe 50 PID 2680 wrote to memory of 2616 2680 cmd.exe 51 PID 2680 wrote to memory of 2616 2680 cmd.exe 51 PID 2680 wrote to memory of 2616 2680 cmd.exe 51 PID 1112 wrote to memory of 1696 1112 powershell.exe 52 PID 1112 wrote to memory of 1696 1112 powershell.exe 52 PID 1112 wrote to memory of 1696 1112 powershell.exe 52 PID 1052 wrote to memory of 2776 1052 taskeng.exe 56 PID 1052 wrote to memory of 2776 1052 taskeng.exe 56 PID 1052 wrote to memory of 2776 1052 taskeng.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Octium.exe"C:\Users\Admin\AppData\Local\Temp\Octium.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1644
-
-
-
C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2580
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2240
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2632
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2008
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1696
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2424
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {20453210-F85A-4737-BF17-C545FDD11B25} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
4.2MB
MD5f206c33258de47d5e05e9f035efc265c
SHA1c744ea5b001dc4a9b1e16dd736f44d0d3e9be002
SHA256298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a
SHA512ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a
-
Filesize
4.2MB
MD5f206c33258de47d5e05e9f035efc265c
SHA1c744ea5b001dc4a9b1e16dd736f44d0d3e9be002
SHA256298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a
SHA512ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59942079d05df5e2a6b7ffdd57b0ebda3
SHA1f038c0613ca7f28ce65a437ab4f861af0cfde14f
SHA2566f7a2c1b9757f97cd5c8a6ab36057371176b4981907ff3b38dcc43d1571310ba
SHA512ce2c7cd410c974d5041013f7dbd7b6f49a3f94efd71a5428f718e1ee17e71abfdba924eeb9b6fa02fcfa089c967ae322f8a4180d6606ea6ea68180b87abd060e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KT6AD57SRVY1B1EFC7QR.temp
Filesize7KB
MD59942079d05df5e2a6b7ffdd57b0ebda3
SHA1f038c0613ca7f28ce65a437ab4f861af0cfde14f
SHA2566f7a2c1b9757f97cd5c8a6ab36057371176b4981907ff3b38dcc43d1571310ba
SHA512ce2c7cd410c974d5041013f7dbd7b6f49a3f94efd71a5428f718e1ee17e71abfdba924eeb9b6fa02fcfa089c967ae322f8a4180d6606ea6ea68180b87abd060e
-
Filesize
301.3MB
MD57d9643e93e382847679cf4fda0f55cda
SHA1ce19cfcf79419d9883bb5add9dc053d38f1bb9f1
SHA25623aa6833d5ee181069a5aa8172e231556db324dca941adc698c32125d6100b11
SHA51203160e6cc38414619d94cd972539081a4683e6c9808a63ab412a3d602cc89a9cfb3778bc4a8b2507b161b3aa7dc938b8edadf9aefcf65218df619085b26588cc
-
Filesize
357.1MB
MD5f5ae2859afd689bab6a7db3cadfdf47b
SHA1156782b7767580cc271290e0d1f88caaed23aa62
SHA256c1b4629d3b47f02506253ec49cbb670149d355082b9d6af61ef8ad43cb0487cd
SHA512182ead7c72f4c37a659e28eb2c0091cd2ae562c8c6e8f784764e94d4d2c80526e84997f83c5653a1b673c832091f27b4e78bb1906060886986e2b4ba0cafb28e
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
4.2MB
MD5f206c33258de47d5e05e9f035efc265c
SHA1c744ea5b001dc4a9b1e16dd736f44d0d3e9be002
SHA256298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a
SHA512ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
330.4MB
MD5ddcecd0f4b55ac48a01afa385c79fd2d
SHA1837e8506803936eef303a53f10dae6beb2e172d1
SHA256eb5beb019da4e77407c90d8cb196ea03646f8995d13aeb7ef7bce9e0dec1f010
SHA51208289535019bd765d7a4a1458cffdceb687ec050ce8363dec5c7b42e8bdc99de5ac0325919a2e0294a75155c8eb727ae61b82c2fad2d203a9b45b6414dfee6ce