Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
File-Supermarket.Simulator.v0.1.2.4_211312.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
File-Supermarket.Simulator.v0.1.2.4_211312.exe
Resource
win10v2004-20240508-en
General
-
Target
File-Supermarket.Simulator.v0.1.2.4_211312.exe
-
Size
22.6MB
-
MD5
08ea1813d6b205c446e6ae655c4e6715
-
SHA1
76f4d2af1c04ec157fc8a270da5980ee6bcb5def
-
SHA256
12288224d26607b30d026a32faf2ac7b49fc32acc8950eeaf60b933f2e39f48f
-
SHA512
a900bd2c4f33dc915fa27911620fafad76139da7c3d58ce3f40b7c2a1dcb11e893dc5b0cde7a74f93d6f1f5dc2ff949141b20f9c7d09a8bc3b9517f861c361e1
-
SSDEEP
393216:m8bMktzgHgxUv/1n6b121UnyuecRZndSk9bGWqCgu5op+wiCYCr2sfqisfU:m8bMkM1n6b121UnyuLEkTqA5a+Nc2sf6
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1688 File-Supermarket.Simulator.v0.1.2.4_211312.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1688 File-Supermarket.Simulator.v0.1.2.4_211312.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1688 File-Supermarket.Simulator.v0.1.2.4_211312.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2592 1508 chrome.exe 33 PID 1508 wrote to memory of 2592 1508 chrome.exe 33 PID 1508 wrote to memory of 2592 1508 chrome.exe 33 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1812 1508 chrome.exe 35 PID 1508 wrote to memory of 1268 1508 chrome.exe 36 PID 1508 wrote to memory of 1268 1508 chrome.exe 36 PID 1508 wrote to memory of 1268 1508 chrome.exe 36 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37 PID 1508 wrote to memory of 860 1508 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\File-Supermarket.Simulator.v0.1.2.4_211312.exe"C:\Users\Admin\AppData\Local\Temp\File-Supermarket.Simulator.v0.1.2.4_211312.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1688
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4ff9758,0x7fef4ff9768,0x7fef4ff97782⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:22⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1320 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1872 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:22⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2464 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2480 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3604 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3520 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3524 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1644 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2572 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2552 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2608 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3884 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1724 --field-trial-handle=1308,i,15448275947657134377,4644727871380191488,131072 /prefetch:82⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2880
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\Supermarket.Simulator.v0.1.2.4.zip.crdownload1⤵PID:1532
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Supermarket.Simulator.v0.1.2.4.zip.crdownload"2⤵PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5881c2d6fb5a6613d81a76f592b11c0ca
SHA1f963f0680d32a06d166ab34cf601e7c7f06a0086
SHA2562e5b31c9c0aa9e860cde6365527a533406cfccfa618f136bb6253057c84c5fd5
SHA512fcd1284e93364e3d3b757253a5538de5bd6e0587a806918440a89f0eb0acd01277d243d847031b1f27b0b923a57fa5e13223e0868b343a69b84625c5a73ed965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed216f43d790cab75b955ddf5015e782
SHA1f80b6ea2e2e08b2e0b9f20497d92b305342aa542
SHA2565e0e43877a72defc62c2efe7a584233d6019375ad3e2de435d52d5f2b0f5e157
SHA5121278d4683f252e1811e2c10f22f7fa9cc982403f8f3afc952dc1a09d59fb8544006147f676ce5183d363c6fa4d739e0ed7ba78bdc1f9aaf7eff04c82ec4cca2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50816b0d48970653220572f3a78abb81d
SHA14a004e1aa310de276e9168c288a794494989ffd3
SHA256cc52b5e12e72d311e4adea28c0eb6ed3f85258d9acc74dfde1816e89864ee9c2
SHA512b4b6fc876d6c4f0716ff92b529669a30415b1d7641b674a78187aaeaf347ef5b1845ce1d1cbfe28a1ba936aee1d1c7d25c61c6a96d323bc1c65c962d4e9e08a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae25bf3fa90b0a00ed070f6b6815568
SHA1b26eb2c80ed273083533bd14887139148a3b3617
SHA256c45c074cd7b2cf2e8f060bc891b3fde2f96f1753cb28ab1f8b490d9ee85e0615
SHA512fe0347a29472ef561281493ce3f6989a055d2ec95ad6328e563d8548474c4a351e5f585f02eceddd31ea2a232e82b5ef6ee03d80a94cb2ec9a7a061a41cf9464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535b394e0b7d6724dde352bb9047975bd
SHA1776676fbd148c02dee747560027c1ee217f64bc6
SHA25630ce9d28a43c952d43ad049ba212fe285e3ae40139f6b638f51444d37203655d
SHA5122f873f0eeacfb160f681e6747ccfe9d672c722163717ddd874715caebda916d4cedf3bc207c00575e8ca281549775ea014ea0469f04efcc7bb4be05f17223099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff86bef2e374683c8c09a42ce75afdd3
SHA1b1c9bf8acc1df09b37b7b9114f2bba9de7eff5c1
SHA256a74efc284e123f6c1dd8c094dd189e86061c76e6d32135342feec2f8154511ee
SHA5125abbb65992e61427d1ba8e25cf345a7b9a238847e30dc063c37d311a388614029a03386385ff0aea3053d8d833782d3225620940d400180b16e777f6a2ffb3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f294c77d5e08900578f8c2d653b93b
SHA1ffd90aa07e582bd295bd999ead8f343d425dc636
SHA256cde30a0666d3090237fda543cc813b701e6c6a7b064d943484b41d6778d672f2
SHA51273ee68d8d717edec95e2a5813c3357121a337ed2a21e4de659842dc75df892edb85bda66b104b0208eccd27bcc67305571458240e30e6d51b63ee9b1b58fda08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501eaa8979184a707c883be652c982504
SHA1f9f3d62f8b4a5089acdbf1590416abe03742f122
SHA256753aedef3477df3bd985b8c1700940040812127cab1ca2f185535d54c650938e
SHA51295d5587729fd00845ebec738791b6d465cccc95f43607e3101fa7a22b419e82f807c54355a1ccbc2e4db729d4130d06e90b7d732966da27b5aa2afa53cf60f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58638dac9db9cbdfc7e85dc235deb4e28
SHA1ce52a4ca7df43d2398684df764cb9a37b153134e
SHA256ba731c2a2cbb09379c4d6c871efc6316de135dce4aabae46c12ab1189f4174de
SHA5129958145776a22f5eed0805a9cf8174d9f4d65595fb1f0dbdcf8d3edc53b82e3af0e6edf96d2714d8023c1fb2b80fbad054a410bdde37daeccb99d38c81b65ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b7b4e4cd4417dbef91fd2ab65628c23
SHA159e5d44ab4d425bf9fa32d5a8aecc2456273b4c0
SHA256f7d58976a80ee34e6046d369c8a26fdf69fcd4e9129e7bd518b94b954df31fc3
SHA512b1d8163e22ade6bc2ff934ae4620e2a95a8bd3098fef195f7d607ac2337a6e4a0ed627d7127cd8594e6e5e08b43b7483c82579ac32421c05b5f38f41a0decb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480c5b40c520bbb194777bfd5a81df45
SHA15978ee075603ce76db10b36a72962304cfc1d5d1
SHA2565b9ef1593be73a57a15ec10107e27901c836cf55efd65b5cdd4243da54499997
SHA51208b9f70172577208b1f9b36c454931c8ea2fd2c2b5127efd31794cd466ef7ac367807fd2275a4c68ae1a362d504e223f5d024255b8e623d9b40b49cd91280342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df65e1690bb3d1c427188cd2c31651e
SHA166000b31bf981ee4b9ed768464e897fe6a301737
SHA256c2f974789879f844a5e8ddb5aa2d2c7f598203a5b7736d8b065b9ef0d9d5ba06
SHA512edc3aceaa65d56ccb4b6228c1dfa005db8eef05017e9340b862df44b7d333f0f50ceb40fc1b75b1429e7cbf8ba8cf3b592d2c37c0d5aacb8717d6ef006264c6d
-
Filesize
86KB
MD52444dfff7156347aec70e03816908b2d
SHA1e346108efd8f9fdc64c4242ac7ec87bb0e2033ab
SHA256bc0ccf27b959533a92ddbfdcf6a11ab22c3bcba5ff3f152fa055346dc3431e1f
SHA512cd037c373cb58966c1e0f3f92a1e1261b6ead0fd50779fdccba945b5f3ebce0a8b248882371aebd7e2783996de676f4664701466943083d089087309846a4b06
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_uploadhaven.com_0.indexeddb.leveldb\CURRENT~RFf77df48.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
361B
MD5e8a51398033724ec37f972b2c2f074f8
SHA1406f2f6b2ec65fd29d930d0fe8a4502f4d0db4d6
SHA256c02e3aaf26b00dbb8618e433833c9061ba2fb24896fda130ffe6748f7f8058b1
SHA5124bf94033530fb226f465ae3b4ae3c3b0284256617c2baf91f5b97443663ca54a9be18f75591d78ab5bddff2d113243f989f8201e4f5b04f48fd84cb7d721c4b5
-
Filesize
684B
MD567d0420b97db49bc063d385850f362b3
SHA1b888a9e867a6c0138f519676c11164b6f96a094e
SHA256e5753d0744e6f22b27d52402d48a51887a34a8e6acab617f0723b3ec124a6dcc
SHA512f2e062b0731e6cf40c9e244200722c0c825dd631666357ba92dbfdcf18f355153e6cadf88d6c858ada857c31c3f3b59b00e0826df4ae2aa07a57151ba8a26306
-
Filesize
1006B
MD5b7c97f040712642f67348929ccdceb2b
SHA1f7f83c9d07815c8db880a28125b9e3070d452a14
SHA256f1f42dc18d739f2443cbbffd5561510e66fb6bf849cdf4985a7766138bcaf607
SHA5128e36dd61b05a6277fdb3dcb9e81044822151b39a023c14e7788d606d93c3b313604661bca9756514f7d252ff01fa6d1bebfb01a20a25286d009512899ebf3b7d
-
Filesize
361B
MD524638f19a2dc8f3f72c73ddd2968c0d6
SHA136af3c3ebfc5b6a40f06218a47b3f96c666acdd2
SHA256f667c3e2da99482044a58b6eb0fe92f38f6de9a69a8c71c417839c3035909cb2
SHA512efef4bb858427028947a112df68237d46b14c465b51bba798c6a059f73b2c4603954bd2659eb26f72eeb5d5094d1c5509dc6f83536fedc82050015d45ed2ce33
-
Filesize
6KB
MD5cbd3097920480e2e703e5c7156f369bd
SHA1ef996954e8a1c39b571909702bf1b945ee39019e
SHA256336f46e23374d3447cb9bf79a82674bfc81ddae8882fbd68fcd38fcb71e81258
SHA5121260ee5fc75e2a333d2d32ce100bdc7c54606d3cb65f7a5cd7876ad88756c5854872fb9595a49a972e593dc1ca94a1201d429ce4847f6c500664636bb06af673
-
Filesize
5KB
MD56545b5888b9bc4020b3abb1185a3d70c
SHA1cc148f119b9d78f0200229ac71f3b8120353e01e
SHA256d756f63eec00b4e02d4d0e2661f782238e09830d3b948bf8c9ab3f0f30e94b72
SHA512ddabe8f130fc0d91a4a14bd006290501e6fa0e66ecbfe772be39799ff4c13f8f44f4190319ec2cdabe144e0816bea37b210b9bb9de47d5b4b455bd5cb768bacb
-
Filesize
6KB
MD5e7c1c98f94b3d8eab3771e32508e2300
SHA198d7222623074e3b20b8aa661a81132324d49081
SHA2565d31d7df5b810ba7c6c1ccb6e32210a9d7fa3f833cac5d131d2fb2e88ec6c5b8
SHA51231cbad3609a9a4c309b941403429eee3b8066cbde352a8738ed0cbeca554a26c7fd4e552aaed9f6e0a671be3db8d1d69144b61085cea9ae0bea24939d2364d51
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b72d1db7-47fa-4ba1-bda2-fbc30b96b79d.tmp
Filesize6KB
MD5f7fba361823719ed263ef3721ca77e06
SHA14346b164491f14b1aeecefd34d34889d250cf72e
SHA2565f456c38c3fccc4f0eddfadb8aeb9328cecd782618c1a2f3b98432c740241d10
SHA51274446f22f1c9e3b6f6b1d3393822ee11882c89d513b1c66e76f226ff311ef7dba7660ba7e30ae757a6d455c339d0d63591890197227b910bdad1c3d3d01a49c7
-
Filesize
279KB
MD540ea9f3f8eddfdcc319602d6dfc492d5
SHA100cad065e973c1433dd8f3951f9ae4c35c0c7235
SHA2565847f8e3101d77da327745ac0376a082badd382d60f4e742e8dca3ccb9cf92e4
SHA5126813402de9e77595a9689ce8300d2cba06bbf0c35d6095a6a8755988b1201832805eddccb5b83f5fe2b8d2b92ab551c397e1a5cc601856e694d3b9352c8368d9
-
Filesize
279KB
MD57ad0d2bb47b77271dae9ec3fc59ec7f6
SHA12b030e8cdf12cec023ee2270cbf85e4d0b627485
SHA256856aa6ce67864dbd55c509d05a3f15a40b772c3d7622e9973a3154d2de89a195
SHA5122a656cf4447e8d0a4a28c986e5339c7bccc663d9d316dce2664524ce6f7869d5b9f95f6913ca7e6985f54a3f712cf046f411e51160c3c0ee06a8e42165c599dd
-
Filesize
72KB
MD511de3154e500f7c5bb00c62a3892c2ab
SHA1683da01ca39b25e1dcccab97bcafc85fa27b7654
SHA256f52534235c3df76d0dddbaf8f20214a8f845cafc99691f72872c1d09805cd65c
SHA5124c3531c6464789d661e745373593b8253109ae3f4813e0c1011ad58bef7120b121a8602a529a0f2cafad703a0a71c255f6b5803956f760723fe981325eed32a5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a