Overview
overview
6Static
static
1wave sourc...ior.js
windows7-x64
6wave sourc...ior.js
windows10-2004-x64
1wave sourc...nce.js
windows7-x64
1wave sourc...nce.js
windows10-2004-x64
1wave sourc...ge.vbs
windows7-x64
1wave sourc...ge.vbs
windows10-2004-x64
1wave sourc...ge.vbs
windows7-x64
1wave sourc...ge.vbs
windows10-2004-x64
1wave sourc...on.vbs
windows7-x64
1wave sourc...on.vbs
windows10-2004-x64
1wave sourc...ox.vbs
windows7-x64
1wave sourc...ox.vbs
windows10-2004-x64
1wave sourc...er.vbs
windows7-x64
1wave sourc...er.vbs
windows10-2004-x64
1wave sourc...ox.vbs
windows7-x64
1wave sourc...ox.vbs
windows10-2004-x64
1wave sourc...el.vbs
windows7-x64
1wave sourc...el.vbs
windows10-2004-x64
1wave sourc...ox.vbs
windows7-x64
1wave sourc...ox.vbs
windows10-2004-x64
1wave sourc...es.vbs
windows7-x64
1wave sourc...es.vbs
windows10-2004-x64
1wave sourc...dow.js
windows7-x64
1wave sourc...dow.js
windows10-2004-x64
1Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
wave source/SynapseXtra/ClientInformationBehavior.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
wave source/SynapseXtra/ClientInformationBehavior.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
wave source/Wave.Classes.Implementations/RobloxInstance.js
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
wave source/Wave.Classes.Implementations/RobloxInstance.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
wave source/Wave.Controls.AI/AIBotMessage.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
wave source/Wave.Controls.AI/AIBotMessage.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
wave source/Wave.Controls.AI/AIUserMessage.vbs
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
wave source/Wave.Controls.AI/AIUserMessage.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
wave source/Wave.Controls.Settings/SettingButton.vbs
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
wave source/Wave.Controls.Settings/SettingButton.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
wave source/Wave.Controls.Settings/SettingCheckBox.vbs
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
wave source/Wave.Controls.Settings/SettingCheckBox.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
wave source/Wave.Controls.Settings/SettingSlider.vbs
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
wave source/Wave.Controls.Settings/SettingSlider.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
wave source/Wave.Controls/HeaderCheckBox.vbs
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
wave source/Wave.Controls/HeaderCheckBox.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
wave source/Wave.Controls/InstancePanel.vbs
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
wave source/Wave.Controls/InstancePanel.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
wave source/Wave.Controls/TabCheckBox.vbs
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
wave source/Wave.Controls/TabCheckBox.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
wave source/Wave.Properties/Resources.vbs
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
wave source/Wave.Properties/Resources.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
wave source/Wave/MainWindow.js
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
wave source/Wave/MainWindow.js
Resource
win10v2004-20240226-en
General
-
Target
wave source/SynapseXtra/ClientInformationBehavior.js
-
Size
502B
-
MD5
db96fa3a511ebb3a3b377ca58753fda0
-
SHA1
04d3689bb056ab1ca3c2803cfd096d8a774e6bdb
-
SHA256
cfbb79f9592d3424e8151f118683c1d8a2d3a65dca1181717736b3548921f17c
-
SHA512
50a2c759be6079f7ea1167d90a05ad72c464d7b7f5ea375afcad6e6af05b77682a9015c16c57b5dd3f0accafec19ae33c30e768d69e0acd1143c59f448810f6d
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 46 camo.githubusercontent.com 52 camo.githubusercontent.com 53 camo.githubusercontent.com 54 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2796 2644 chrome.exe 31 PID 2644 wrote to memory of 2796 2644 chrome.exe 31 PID 2644 wrote to memory of 2796 2644 chrome.exe 31 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 2988 2644 chrome.exe 33 PID 2644 wrote to memory of 3008 2644 chrome.exe 34 PID 2644 wrote to memory of 3008 2644 chrome.exe 34 PID 2644 wrote to memory of 3008 2644 chrome.exe 34 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35 PID 2644 wrote to memory of 2092 2644 chrome.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\wave source\SynapseXtra\ClientInformationBehavior.js"1⤵PID:2300
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6579758,0x7fef6579768,0x7fef65797782⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:22⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:22⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3312 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:12⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3452 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3456 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2500 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=1264,i,1602673674749776635,2496588508961101193,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcc9666a9818bcf1986d403488d0a179
SHA1429aa2408a1de58f51ed632da429b277e4b265c0
SHA256d94bb1ca399078e2c5c179a0817ad4840f7a51fe26a1b06e54a2b2793e5b86ce
SHA512d93ff206de672a52b2736e9c495fedcfc8eb9bef593ef535e1a7064115ab6d94514f8f342d634b9d882c8c7a639f5d9e773c6b54331eadf5770078c3573cd2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5790c7df95b7c54abd080f4fde8f42f38
SHA172232f5b0e1b973c255d3c4ec969db04dc93db8b
SHA256e6a9bf782c9e5405c86f5d7572613a759ec34c18c6756f6d826203954415133a
SHA512af0809f8b6ed489c6b932fbc357f893e34e2a8ee955f9b880685493be9375e34023960366f42c2fe5dae4e6253bd6da684b166e1b19e4c8d5cc3cc369cbd7ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33ab94ad773ae24a5d26ef4a88735b1
SHA174c34dcfd0dc97348dfdd7d853dfbff25ea86f1e
SHA2566d0e2eb3a8ec8177f1e5ea837b79ffcd265f9ddc13c230e19207af268dcf50bd
SHA5124911a7289b21a3d72bd1f3a5c2aaebfb24c31c06079a1131f2a01e868c352f1fc6cab5040edb7fb2221a554c6aa6e91202ea417e8649da46f4498bf9b73c3156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53393519c7768989b863830c972516984
SHA1945f050df6e6e9fe7f2d23c6b4674ab0bc7b99ff
SHA25613c598320cfedb915d75130ab093ebeae31f9c36cb8479c8d912c19641860b79
SHA512e9cccd91f2322a9058d0f1e4dc1b74ea64fbb7f40390080274787267d2f223f9df095878903988274340e9a32d6f8ea1bebd61e0838de369176644444dd6bbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e8da51cabb458ad0b03cc2737bb5a7a
SHA1a5e086f8455714c2728fb86e67dc60c467261e48
SHA2562802f4aacfbadbf801fdef08176e7afd0844a675258af2bb74ac7435773cda09
SHA512111f29145e86bd3aa9dbddd33b8a797a92a927a21e759df2edf1a706eb4b3e7706e181143de24c51b8d57da09318e5c6bb29124e328a901537edff9703a48236
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6b30bdf0-fe88-4d74-b30d-36b40a4afd1d.tmp
Filesize6KB
MD5a4fb08bf953c4daf300b1298aac7bca3
SHA1bcf7901b2a5d728ca22ac6e6db8204facaf7d092
SHA2565d7c6dc503904f55b0ebb13fa137b1edbc02f7f934f28b0db0f771dd8a78b0a3
SHA512aa6f8a4a7798d4ce68a48eeda907a5c70812945935186cc9bdd08f6040e4c20e2cde8800047d152d1ccb64d6f9d44fe49e306fca5a54bb409def0be9592a2a6c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
524B
MD5316f03f060a44cfdcd17fe2219460971
SHA11a76bc716a4f69d1459968f9f91d1666c89fea6e
SHA2565c4dd5d1020d04265524e12a334841ceca326cb88c5697e1cecb38e7e21cc6df
SHA51272e1545c8fe49f1d19d4ea30a62f95f327a8b095befe54e636e2d8f694ef012c9ec4fe7a28fc0d7b65fdbf640ae1a5d9cc996a386dc12b71a917f42e1f7e5c70
-
Filesize
524B
MD5f383a8891c87a715bf63d2b1a464b068
SHA1a28a041ab77cd541031b42714bd569209d6024a7
SHA256bd2a4eea147ebcb7ca9d8548a2b130408b9bbd57e8608570213855f0cbbba70d
SHA5122f33e2a4036bae9b255339b075bfb772c9d0a6e6fdb0c07cfb11c302cad627b5d34042a6fd3ec764480947f6e9be00a5408534285a93d2ff15820fd9e688788f
-
Filesize
361B
MD52a18907ea50cc8da95b74ced7ec02be7
SHA12f0d455ccf87cfe0a6e6a179bc3d7d9e46d9601d
SHA256c7c7d326c9ca48e90c85359ce48c62bd17be0546af2734433d26bdf81367fb65
SHA512f940e067667aaaa1e8e22dca77d65fc5ee36bc326b0fb95054a61a03f6d3a62b1825dbf9da90d900a3391e3c71c2708a6d19d247cf7f3f68f05773639a9a7dec
-
Filesize
524B
MD5b4095eab8c17afe3965a962029ac18d5
SHA127e915f0dff81e95a9c25567170e11f432f4e293
SHA25678d45d45bc3b19b272f7ee0e08fd1801b3f026ed47b180e93c9745e671d347cb
SHA512b5feee47c76ec7668e836c9883f6650a2850941a84621724e4411b1738198dc6f25b75a56355c351c68fd5781894c1a991444b42f1ed1104880286c96eda7216
-
Filesize
524B
MD56b7883e0c39093cb83593e7ac32cc953
SHA195bae54d92a9daa1b779374fe2a027fff9df4414
SHA256a7ecc6fcb3079e4d55a4104f8609dcdb96f3db3c74510963d6b29e0810223ce7
SHA5128e1bea3a9b2f5fe7a0f7d34d6b13426a26c72c46afcd69d0f16866cf829e9011ffad7da58671c4b3366a467c983946d374a5faf687576b56caee842bd26d075c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity~RFf76d807.TMP
Filesize524B
MD5f35aa29cca3b2c57f0fbda0354907681
SHA15d00424371db126167dca615730d3c6e5b96f696
SHA256d7df919dc74f4ac2137c1406e6c66518a1761879d971b8cb436863dfc231761c
SHA51235323e958269450ec7564b2076f23ef0e1a7375095e39632b2317d1e5845c9669ee0a9ef88de5685b830464e07f8b9a4ac3382168dfa54f7a3f92050a958dd88
-
Filesize
6KB
MD5dd60158f5db751f739e1541cd6a6206d
SHA180bc7896d848bc3f15a4e169cece75fb6b8a0913
SHA2566d46809f33d0d5d6cb05ad94cb9ca8d99e380316bf204c1ad29676d4d487a904
SHA5128349b486c3bb14c34f922cabe1f147e201e69808e00abee43b93c13e1e780147f915ab2365d4e54f938b9e2a8ab6b76cf0603e3992fd1545a47533c6db8ef86e
-
Filesize
5KB
MD546d1f06c49e39b68f8aaf08391e171ea
SHA189e5a4d1d6548c4006d6ede60fd16e488f50bb3f
SHA256749a4502b69e5ee6e0c4d1ade5ef52e735631fdd2eef741ad7b23e55cd02bb37
SHA51289f391d8b2dd54dca71018e60463403801bdd4e3fa41453456299e2b1966b84714d1ae9f6d3a7fdea436c12e7881c08bdddfe93fc1a958a06229e0bbb9d501a2
-
Filesize
6KB
MD5be086344729f9e4729ac36723837341e
SHA148c085f53579f6b2b8183732f226fc04e36ac4bf
SHA256e1dc7f1ec250a7b4c0ad960fe92e378473f4a18ab5ffdbae117588f18edc2ffe
SHA5127dfda8eb5ce8d5b14dd0c048130a4a7c68846e7007520e6812eb00e23ef8d65fc6b74905c225068413f1658e3e53d0af5795970782c9ee6f4a10f5219391f8ea
-
Filesize
6KB
MD5480ef743273a974615be7972cb1d9928
SHA11a4f42ed4c342cc1c53d499e4c7987d572cbc493
SHA256e98825420ac655943ed4934ac44e9d7fb2be0cf3c6576eb0fde2a79f77c698fc
SHA51243ba285f9891486217ec28d9c1bd0d638b642d3becaf824f6a351fdc3de961481f2ac9e8dcf6f93f834ded4055f2dbae012aaa89e53c274607c0e3e85c821714
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a