Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-05-2024 21:54

General

  • Target

    HHQh.html

  • Size

    20KB

  • MD5

    0d7dbf76c2ac09c9158a914a47a6fe83

  • SHA1

    c56cc21060cf7b79cf499697e21df122896d276a

  • SHA256

    e9fc1d4832ddeb97a25581ee0eee156c399cb00c1c5cd2e390c08442724ed274

  • SHA512

    502f98e26ce0b2dc00858259ce82b5f39a7f93abc7d1d726e00ccfb65079083d903680f91a2103906d8840a63e9f385b8b3399f52f53d1a5ff1daf117bce141e

  • SSDEEP

    192:ZQ7hEoDgcUpeWw9y89uQABYhfay80ZXIQhVaEa2i8ca1Wb/:ZQeFyASSoBdaEaU1Wr

Malware Config

Extracted

Family

xworm

Version

5.0

C2

energy-views.gl.at.ply.gg:50971

Mutex

w8XFGwAA7AeM6RTM

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\HHQh.html"
    1⤵
      PID:2776
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5056
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3824
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1668
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4460
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:856
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:5040
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb31a49758,0x7ffb31a49768,0x7ffb31a49778
        2⤵
          PID:4980
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:2
          2⤵
            PID:1712
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
            2⤵
              PID:4696
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
              2⤵
                PID:4688
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                2⤵
                  PID:5096
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                  2⤵
                    PID:3832
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4516 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                    2⤵
                      PID:5132
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4680 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                      2⤵
                        PID:5168
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4700 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                        2⤵
                          PID:5184
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                          2⤵
                            PID:5476
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                            2⤵
                              PID:5548
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4948 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                              2⤵
                                PID:5956
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3792 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                2⤵
                                  PID:5192
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5540 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                  2⤵
                                    PID:5384
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                    2⤵
                                      PID:5620
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5404 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                      2⤵
                                        PID:5768
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4432 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                        2⤵
                                          PID:5160
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5916 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                          2⤵
                                            PID:4236
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2972 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                            2⤵
                                              PID:3020
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3104 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:1
                                              2⤵
                                                PID:5564
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1536 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                                2⤵
                                                  PID:5508
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1832 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                                  2⤵
                                                    PID:4620
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                                    2⤵
                                                      PID:4452
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                                      2⤵
                                                        PID:5792
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=988 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                                        2⤵
                                                          PID:6108
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3168 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:8
                                                          2⤵
                                                            PID:4416
                                                          • C:\Users\Admin\Downloads\Архив ZIP - WinRAR.z.exe
                                                            "C:\Users\Admin\Downloads\Архив ZIP - WinRAR.z.exe"
                                                            2⤵
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            PID:6000
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\Архив ZIP - WinRAR.z.exe'
                                                              3⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5292
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Архив ZIP - WinRAR.z.exe'
                                                              3⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5140
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'
                                                              3⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5488
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                              3⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2388
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\svchost.exe"
                                                              3⤵
                                                              • Creates scheduled task(s)
                                                              PID:5384
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5316 --field-trial-handle=1860,i,17483978351910378836,4151692866375136055,131072 /prefetch:2
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3060
                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                          1⤵
                                                            PID:1208
                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                            1⤵
                                                            • Modifies registry class
                                                            PID:5856
                                                          • C:\Users\Admin\AppData\Local\svchost.exe
                                                            C:\Users\Admin\AppData\Local\svchost.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:5804
                                                          • C:\Users\Admin\AppData\Local\svchost.exe
                                                            C:\Users\Admin\AppData\Local\svchost.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:1080

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            1bfe591a4fe3d91b03cdf26eaacd8f89

                                                            SHA1

                                                            719c37c320f518ac168c86723724891950911cea

                                                            SHA256

                                                            9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

                                                            SHA512

                                                            02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            a74c61b7cabc8bb84e3269f4affabc53

                                                            SHA1

                                                            40fa1737fcd62ee1a0ebd6f0bf91c4df34f28899

                                                            SHA256

                                                            bdd955a7be771eea31bbe1fe94825d90c6c654741fa34dbd49d20213238bf261

                                                            SHA512

                                                            af01d75dbc13388e4c60219de3c5f4a157888261605f28444a3300fa9ec96e4f5e58932c57894ad9aae878806f44182eaa277aae1b7f62b2d99a3d750ddfe67c

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            46295cac801e5d4857d09837238a6394

                                                            SHA1

                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                            SHA256

                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                            SHA512

                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\MANIFEST-000001

                                                            Filesize

                                                            23B

                                                            MD5

                                                            3fd11ff447c1ee23538dc4d9724427a3

                                                            SHA1

                                                            1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                            SHA256

                                                            720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                            SHA512

                                                            10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            10f5efca469db3200171b857615c2112

                                                            SHA1

                                                            c5796d532021d9d83e742a109ac351d33d08433f

                                                            SHA256

                                                            5d379fde0175bc39005b18f28ad98181679da5ce944524f3186c9510c601b8cb

                                                            SHA512

                                                            7a4765c243a4a7355995436b208746d464f69bff582adebfe7e87d20b1cc4be6c2c34773801ddb5e62ca8df263da00b50a8eb3c58167c153645699f63ad031ad

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            63f75c2233d9f8269554ff1d12c15305

                                                            SHA1

                                                            82957716aabc676855891e3503abccf882ba4a59

                                                            SHA256

                                                            b89357a8df879c858b84368759bb6c40dd9e6af9e484a4fbd2b673cbb4f3fcc2

                                                            SHA512

                                                            9a2ba49fed6a66f300122ca73bd63022eee839f985431f5693f3341f5ead7c0488146e12316da3f8142983686822fcf134256d435dd2d456cd119ef2f1026a3c

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                            Filesize

                                                            371B

                                                            MD5

                                                            b4ac6c64543a491ebdde62616067499a

                                                            SHA1

                                                            0ba142bf84a54f5083ee1e5b14ba0930ba8f24d3

                                                            SHA256

                                                            97805b646372903951a39da4ea578e02df85217c384e2aa829d5b65edb4581cf

                                                            SHA512

                                                            6bd23bf4c4eaef48bcee8563c52368e682aa4d16d70ff5ebc4179c7861399baa7ab32fbe8fa494bc798bc1eb2f6674f7524007b4e83e0362dc091a319741661e

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            406f79deb8a1457ea7edaa292f445864

                                                            SHA1

                                                            8ca34a6cd1395a6f1628e81c48dbd65027513db5

                                                            SHA256

                                                            4e2a9d41344633b02c45455e3f8f63b378c7b5d80f90fd916cf7fc5d603dbe88

                                                            SHA512

                                                            6b26d1feaab0003e10310ee8da76d06ef99cb5591db9999eb57580977e2f8eada6cf566cf5462e62b6f1ad96ea976073fabd6aba5c3372790298bdbbcc1a0a9e

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            883352805e4eaec3dfbdf5ebd07e84b7

                                                            SHA1

                                                            193d6a8d437d09abcbc040e993754c2df406c057

                                                            SHA256

                                                            9b73103914a9410aecdf1e5940ab0ede147276aea1bf3007861a75794fa1dcbb

                                                            SHA512

                                                            37a5b3b526df0c91093ad4da41d870b8f095377cf84d4f002a6cb5f2281d6b37002ca84c00ca08ce1c6e229b4141b2f539dc102652c26336487203e381207d34

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            659fdb8e120ff884c02b3bcee842d7a4

                                                            SHA1

                                                            2ee6bb210d79d386865fc377f061d2f158f136f0

                                                            SHA256

                                                            d57ba64ebaad9e20953413eb85647096a2515d1c4f23c5c4a902327bc726c9b4

                                                            SHA512

                                                            3734a30a4f4ad298ec2e6332cfaa8e8c99a55bc4a4d9ecd2f4824dca3e406f5392c83e9150d532d9594ecf742391a411b610ebfbb4ba5c3e91a35f51f8b5a32b

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            289773eedc340841f0c9ddf68edae792

                                                            SHA1

                                                            c3b2128bb6d05bf232b7b27ea4fdd8b416132288

                                                            SHA256

                                                            5950e856fffdf7a3bb048131efa87efa4858893814ddb3fd9d56ee8696c0ad9e

                                                            SHA512

                                                            1de3c85daaf00e5dd0f8c1a2b40e462464aa863eebfd853c5220b03cec08d7d1c97e5ac37c2d61f1299a47b03431654440c75670456e830294d7d40ce62b8828

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            1e59f639aa4c8612b8d5c9dbe1fa44c9

                                                            SHA1

                                                            bb8a0025a4f86f39b642071692a58ff620e6fe94

                                                            SHA256

                                                            c61b3b1093381b1052bbc6468f1abfc50bf3c6143e38a1fdc89be1a7d84d623d

                                                            SHA512

                                                            f51598ce38c9df8c67b9dc0d243f56cffd79aeb216842c8b186b135c192244549ce68c69bde244d93a9dcce8500277c0326d027ea098de6de7b7c959bafcbc76

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            273KB

                                                            MD5

                                                            05159347c2b6c2b6aca1422a40e529ec

                                                            SHA1

                                                            4dce3e45ced356b54d2b667cd0f965cad06f86eb

                                                            SHA256

                                                            cd2414b3616dd35decabc4c48e1086a5e2a9d7ac67ec209e1748ba9ef35099d2

                                                            SHA512

                                                            d562288ad8a089a3e0d5007023b8bb7c2e29e703d0bb1e1b6523688656005b1642231cd9e5ea1bc3fac67d01e2d28ec5f3f33f89940b215210fd8ab87cb0f3f9

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                            Filesize

                                                            111KB

                                                            MD5

                                                            66a014b181ce08aa0515af33d53ee821

                                                            SHA1

                                                            0fc8e6d6751fbcbd5adea6841db21170bee526df

                                                            SHA256

                                                            5fbeb3a27fc87413ae6a94b741c54b3c9bbaadce8cd4b5de05dd3a961ef2219b

                                                            SHA512

                                                            422a9c07b9d290167b07ce66f4d171df1997bb1dad370a73de161201084bc20649e821da3e3068e150951ef4f037abefe6df962869062b6d574e4bf4ff2397ae

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                            Filesize

                                                            98KB

                                                            MD5

                                                            a075762c08a7ffc17a4eb65a47ffa431

                                                            SHA1

                                                            f4b0fe2bd9d1b7452550c918309726bba0a33933

                                                            SHA256

                                                            437daa6f9a6457f9f6593bb345a6147b15ea24886c7a47e2d6bf6bfd320085af

                                                            SHA512

                                                            142f69039df401802ab039ce68fa71e4d275fbb371d16c771f499d10014f8aa40d6e5f5b2dbd3aaf5b8d5b69964f323a1d864bbc7b0dc6d50f04bcfbcb59d218

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe58cc25.TMP

                                                            Filesize

                                                            93KB

                                                            MD5

                                                            1024616a0df2fd2b83ed29f66d921e67

                                                            SHA1

                                                            3365a5f1d249430e5328f54b460077226c474b50

                                                            SHA256

                                                            abcf8f46efbca95c48a86f8c38ef69477a8d432b4ed64d6a37c8b627e6beba7c

                                                            SHA512

                                                            82b0f5630b640e5e28152b9e399e3bd879380261b07c3e013089b3bc2969a6251f5c89e1f18bc24d1ab6fc64c8a7fbda88b948c723a10639e372449ca331e848

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                            Filesize

                                                            2B

                                                            MD5

                                                            99914b932bd37a50b983c5e7c90ae93b

                                                            SHA1

                                                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                            SHA256

                                                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                            SHA512

                                                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            8592ba100a78835a6b94d5949e13dfc1

                                                            SHA1

                                                            63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                                            SHA256

                                                            fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                                            SHA512

                                                            87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

                                                            Filesize

                                                            654B

                                                            MD5

                                                            16c5fce5f7230eea11598ec11ed42862

                                                            SHA1

                                                            75392d4824706090f5e8907eee1059349c927600

                                                            SHA256

                                                            87ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151

                                                            SHA512

                                                            153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q7BUKSPQ\edgecompatviewlist[1].xml

                                                            Filesize

                                                            74KB

                                                            MD5

                                                            d4fc49dc14f63895d997fa4940f24378

                                                            SHA1

                                                            3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                            SHA256

                                                            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                            SHA512

                                                            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            47980142282f10c9589fc00daee05f7b

                                                            SHA1

                                                            d4c3e5c20466a72b41ad7638f70b9f3e0afabbf5

                                                            SHA256

                                                            7581b5276e4b9a9bded63f693c68df7c119e43587d30416a288942704ac5af6f

                                                            SHA512

                                                            b5a426269f6cdd96209d63ca98e4c66fb021dc9e67ce559a4d5bb85f1cf060a306747a92146738e71244cce789df20071d092cd4fb42147cc87f70990a46eacc

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            4b05c35afbb674b30d0390eafe0ee4a3

                                                            SHA1

                                                            34db633033bd9d161457f66ab65ed275bd1f8b01

                                                            SHA256

                                                            3fef02926afc4fe6b65f2e1edb8d05ca71147ec6851029823043cf8f02c6182f

                                                            SHA512

                                                            53b154daaec59bee1355580884377b843a20dbfd410ea80699ffbecab5116e0a7268081971c8faa702fdb017ced2ed286c475dfdab06ea160e03347f3af32547

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            8edcafe703eadb745b233cef512bcbf9

                                                            SHA1

                                                            debb0621f03443611cafad46c24f8bcb9317c238

                                                            SHA256

                                                            87bc80b3f879865cef57f360d862bb804fcb9703c1eee4c2dff0b5a1dd35e24b

                                                            SHA512

                                                            61fdaee9bcffa8bacba5a2a6c6c9b1c743a2e4c3c5eccc9b6b793e7b586de0cdb8d0a78b42e24e5af67272cc7e544ed93a529077886d520551654bcbb1894f92

                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Q8D7OW8Y\suggestions[1].en-US

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            5a34cb996293fde2cb7a4ac89587393a

                                                            SHA1

                                                            3c96c993500690d1a77873cd62bc639b3a10653f

                                                            SHA256

                                                            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                            SHA512

                                                            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_luzmgpts.qfl.ps1

                                                            Filesize

                                                            1B

                                                            MD5

                                                            c4ca4238a0b923820dcc509a6f75849b

                                                            SHA1

                                                            356a192b7913b04c54574d18c28d46e6395428ab

                                                            SHA256

                                                            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                            SHA512

                                                            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                          • C:\Users\Admin\Downloads\Архив ZIP - WinRAR.z.exe

                                                            Filesize

                                                            203KB

                                                            MD5

                                                            d994c934486b21dfba6e5afe16ef522e

                                                            SHA1

                                                            01144f1a4dd808e6118a133dacba78c59625c81c

                                                            SHA256

                                                            04409361d2ff59ebf8b785a64423135d0d4e984b3280c81800c6257745325a5d

                                                            SHA512

                                                            a54f19069f90fa26ee064213671dd7392956c0db23fbd4d9d5a999b884d0247c1596bb439e01ba8b363dd570d5444cc9b17551fc273ed6c65f25036ce1ba39b1

                                                          • memory/856-51-0x0000015A3A2D0000-0x0000015A3A3D0000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/856-189-0x0000015A4A3D0000-0x0000015A4A4D0000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/856-84-0x0000015A4ADC0000-0x0000015A4ADC2000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/856-90-0x0000015A4AFC0000-0x0000015A4AFC2000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/856-182-0x0000015A4B6B0000-0x0000015A4B6D0000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/856-206-0x0000015A4A4D0000-0x0000015A4A561000-memory.dmp

                                                            Filesize

                                                            580KB

                                                          • memory/856-133-0x0000015A4A4D0000-0x0000015A4A561000-memory.dmp

                                                            Filesize

                                                            580KB

                                                          • memory/856-50-0x0000015A3A2D0000-0x0000015A3A3D0000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/856-86-0x0000015A4ADE0000-0x0000015A4ADE2000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/856-82-0x0000015A4ADA0000-0x0000015A4ADA2000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/856-88-0x0000015A4AF00000-0x0000015A4AF02000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/856-92-0x0000015A4AFE0000-0x0000015A4AFE2000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/3824-224-0x00000181BD540000-0x00000181BD5D1000-memory.dmp

                                                            Filesize

                                                            580KB

                                                          • memory/4460-45-0x0000021B3E480000-0x0000021B3E580000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/5056-35-0x0000020136E90000-0x0000020136E92000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/5056-520-0x0000020140AA0000-0x0000020140B31000-memory.dmp

                                                            Filesize

                                                            580KB

                                                          • memory/5056-478-0x0000020140B70000-0x0000020140B71000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/5056-479-0x0000020140B80000-0x0000020140B81000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/5056-0-0x0000020139B20000-0x0000020139B30000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/5056-16-0x0000020139C20000-0x0000020139C30000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/5292-539-0x0000029FF5BF0000-0x0000029FF5C66000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/5292-536-0x0000029FF5A40000-0x0000029FF5A62000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/6000-506-0x0000000000EC0000-0x0000000000EF8000-memory.dmp

                                                            Filesize

                                                            224KB

                                                          • memory/6000-769-0x000000001D110000-0x000000001D11C000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/6000-789-0x000000001C670000-0x000000001C720000-memory.dmp

                                                            Filesize

                                                            704KB

                                                          • memory/6000-790-0x000000001F4A0000-0x000000001F9C6000-memory.dmp

                                                            Filesize

                                                            5.1MB