Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
Hybrid Warefare.docx
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Hybrid Warefare.docx
Resource
win10v2004-20240226-en
General
-
Target
Hybrid Warefare.docx
-
Size
1.3MB
-
MD5
d8df558c411548de703b56eac8e05143
-
SHA1
b0c489a139435bbdf7b565fa70733b7fda1c660e
-
SHA256
acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7
-
SHA512
caff566ce0a18567b6a39a84d98dc54ec67fe7c1122c245b454ac54667a0144615de9b29370c5e68b2f89dcb2f8b0fa1cae960d14813a88d78e7e4524f8e6faa
-
SSDEEP
24576:0EkS4d0mA42vni/50WwiA6lMxjcs2IqRI+pFtZUFPFSvPX+:XhI0A+ih+H6lcj/27I+jtGjwO
Malware Config
Signatures
-
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
FLTLDR.EXEFLTLDR.EXEFLTLDR.EXEFLTLDR.EXEFLTLDR.EXEdescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3908 2860 FLTLDR.EXE WINWORD.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3728 2860 FLTLDR.EXE WINWORD.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4612 2860 FLTLDR.EXE WINWORD.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1520 2860 FLTLDR.EXE WINWORD.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4968 2860 FLTLDR.EXE WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 50 IoCs
Processes:
WINWORD.EXEdescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1e54 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2766802693-3421513737-3041509464-1205974695-3631753376-1010291695-569386053\DisplayName = "OICE_16_974FA576_32C1D314_D6D" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPCONTAINER\STORAGE\OICE_16_974FA576_32C1D314_1624\CHILDREN WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1624\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2766802693-3421513737-3041509464-1205974695-3631753376-1010291695-569386053\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1638043192-4027777753-286129826-2214194826-3791980739-399595818-399592511\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_99c WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2766802693-3421513737-3041509464-1205974695-3631753376-1010291695-569386053\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_d6d WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1624 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-3139274306-644582867-1219025943-2515110047-1896429261-3717909472-3999022267\DisplayName = "OICE_16_974FA576_32C1D314_1624" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-3139274306-644582867-1219025943-2515110047-1896429261-3717909472-3999022267\Moniker = "oice_16_974fa576_32c1d314_1624" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1e54\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-443092770-508034391-430098558-1128169260-2299761887-502886525-3743725395\Children WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1189616381-1105224182-4251398050-1151390901-2756567655-1656705938-3361298900\DisplayName = "OICE_16_974FA576_32C1D314_3322" WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-443092770-508034391-430098558-1128169260-2299761887-502886525-3743725395 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1189616381-1105224182-4251398050-1151390901-2756567655-1656705938-3361298900 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1624 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_99c\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_d6d\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_99c WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1e54 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2766802693-3421513737-3041509464-1205974695-3631753376-1010291695-569386053 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-443092770-508034391-430098558-1128169260-2299761887-502886525-3743725395 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-3139274306-644582867-1219025943-2515110047-1896429261-3717909472-3999022267 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-3139274306-644582867-1219025943-2515110047-1896429261-3717909472-3999022267 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1638043192-4027777753-286129826-2214194826-3791980739-399595818-399592511 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1638043192-4027777753-286129826-2214194826-3791980739-399595818-399592511\Children WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-443092770-508034391-430098558-1128169260-2299761887-502886525-3743725395\Moniker = "oice_16_974fa576_32c1d314_1e54" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1189616381-1105224182-4251398050-1151390901-2756567655-1656705938-3361298900\Moniker = "oice_16_974fa576_32c1d314_3322" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2766802693-3421513737-3041509464-1205974695-3631753376-1010291695-569386053\Moniker = "oice_16_974fa576_32c1d314_d6d" WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1638043192-4027777753-286129826-2214194826-3791980739-399595818-399592511 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPCONTAINER\MAPPINGS\S-1-15-2-3139274306-644582867-1219025943-2515110047-1896429261-3717909472-3999022267\CHILDREN WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1638043192-4027777753-286129826-2214194826-3791980739-399595818-399592511\Moniker = "oice_16_974fa576_32c1d314_99c" WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-443092770-508034391-430098558-1128169260-2299761887-502886525-3743725395\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_1e54\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPCONTAINER\MAPPINGS\S-1-15-2-1189616381-1105224182-4251398050-1151390901-2756567655-1656705938-3361298900\CHILDREN WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_3322\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_d6d WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_3322 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1189616381-1105224182-4251398050-1151390901-2756567655-1656705938-3361298900 WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1189616381-1105224182-4251398050-1151390901-2756567655-1656705938-3361298900\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_3322 WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_d6d\Children WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPCONTAINER\STORAGE\OICE_16_974FA576_32C1D314_3322\CHILDREN WINWORD.EXE Key deleted \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\oice_16_974fa576_32c1d314_99c\Children WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-3139274306-644582867-1219025943-2515110047-1896429261-3717909472-3999022267\Children WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1638043192-4027777753-286129826-2214194826-3791980739-399595818-399592511\DisplayName = "OICE_16_974FA576_32C1D314_99C" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-443092770-508034391-430098558-1128169260-2299761887-502886525-3743725395\DisplayName = "OICE_16_974FA576_32C1D314_1E54" WINWORD.EXE Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2766802693-3421513737-3041509464-1205974695-3631753376-1010291695-569386053 WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\mailmofagovmm.mofa.email\hybridwarfare-866394\file.rtf WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2860 WINWORD.EXE 2860 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid process Token: SeAuditPrivilege 2860 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 2860 WINWORD.EXE 2860 WINWORD.EXE 2860 WINWORD.EXE 2860 WINWORD.EXE 2860 WINWORD.EXE 2860 WINWORD.EXE 2860 WINWORD.EXE 2860 WINWORD.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2860 wrote to memory of 3908 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 3908 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 3728 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 3728 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 4612 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 4612 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 1520 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 1520 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 4968 2860 WINWORD.EXE FLTLDR.EXE PID 2860 wrote to memory of 4968 2860 WINWORD.EXE FLTLDR.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Hybrid Warefare.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3908 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:3728 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:4612 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:1520 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT2⤵
- Process spawned unexpected child process
PID:4968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5a471d39c02ee8428702b468c843c62e3
SHA191e6f53c4dce4d7822f120da20a75113e5a7dced
SHA2560c9a8ce9516edb686faf2bee4bd9dc3285207031fe5f2f742accf4a525518d8e
SHA512806dd530ce299b765554bb6ae827506d63b9d8a24294df4e827ca8b808894c2b8845009239f80282f522177de483d95099e74ef797e6f3b15a2b54f92dffc03b