Overview
overview
3Static
static
31. Kadınl...-1.pdf
windows7-x64
11. Kadınl...-1.pdf
windows10-2004-x64
12. Kadınl...-2.pdf
windows7-x64
12. Kadınl...-2.pdf
windows10-2004-x64
13. Kadınl...-3.pdf
windows7-x64
13. Kadınl...-3.pdf
windows10-2004-x64
14. Kadınl...-4.pdf
windows7-x64
14. Kadınl...-4.pdf
windows10-2004-x64
15. Kadınl...-5.pdf
windows7-x64
15. Kadınl...-5.pdf
windows10-2004-x64
1Resubmissions
15-08-2024 23:37
240815-3mbcbswgkj 315-08-2024 23:36
240815-3lyq8swfrp 315-08-2024 23:35
240815-3k8j2swfnn 315-08-2024 23:34
240815-3kte5awfll 315-08-2024 23:30
240815-3hc1cs1hjb 322-05-2024 21:23
240522-z8th9ahd54 322-05-2024 21:10
240522-z1jn3sgg8v 322-05-2024 20:58
240522-zsa2zage37 322-05-2024 20:37
240522-zd98hsff7y 322-05-2024 20:28
240522-y8z6csfe59 4Analysis
-
max time kernel
1684s -
max time network
1176s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:58
Behavioral task
behavioral1
Sample
1. Kadınlarla Tanışma Rehberi Modül-1.pdf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1. Kadınlarla Tanışma Rehberi Modül-1.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2. Kadınlarla Tanışma Rehberi Modül-2.pdf
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
2. Kadınlarla Tanışma Rehberi Modül-2.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3. Kadınlarla Tanışma Rehberi Modül-3.pdf
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3. Kadınlarla Tanışma Rehberi Modül-3.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4. Kadınlarla Tanışma Rehberi Modül-4.pdf
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
4. Kadınlarla Tanışma Rehberi Modül-4.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
5. Kadınlarla Tanışma Rehberi Modül-5.pdf
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
5. Kadınlarla Tanışma Rehberi Modül-5.pdf
Resource
win10v2004-20240426-en
General
-
Target
2. Kadınlarla Tanışma Rehberi Modül-2.pdf
-
Size
2.2MB
-
MD5
7f7ae17b6e256e5ab7976c7e0b9d78eb
-
SHA1
02ddebef058e5b0628a84ef491c6bb13790a2b31
-
SHA256
eb4f59dd2f511a6c335e2c73af0aaf7404f77e5d47ab75eb8493069bfc8bae9f
-
SHA512
d8df994b66ca44fe05c50489a74b16706a9df6f18517a9a8e786796e83e546c4e9943098051750d095f74bcad8ead9b8c9f5320e2dbcb159d8e0ba012e3af5a4
-
SSDEEP
49152:8dJuFolRO+QPdu5oCwDvkQsEQPvIwU1pG91KXaP8:8dIFSsOaCFFEEvBUaKqP8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1900 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
AcroRd32.exepid process 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe 1900 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1900 wrote to memory of 2364 1900 AcroRd32.exe RdrCEF.exe PID 1900 wrote to memory of 2364 1900 AcroRd32.exe RdrCEF.exe PID 1900 wrote to memory of 2364 1900 AcroRd32.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3328 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe PID 2364 wrote to memory of 3444 2364 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2. Kadınlarla Tanışma Rehberi Modül-2.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3123DACE1C1AD98C722BBE72D610E8A8 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3328
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=47FD5CE33A3847ED11CB18A8A36087E2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=47FD5CE33A3847ED11CB18A8A36087E2 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:3444
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=011DD7B77A4018047689271CEA9447D3 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4168
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F1FC4FCEDB5D3ABAB8E59091AF3ADB27 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2140
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3D916058E9C8C76896D7C09475A2D5F0 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3228
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=59AFD01BB3A406456A696F05C659147F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=59AFD01BB3A406456A696F05C659147F --renderer-client-id=7 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:13⤵PID:4120
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5eaacfa7dad62b4f40c87b302e369f472
SHA19329678c591d0a790a811b06523a9a15f0d6cff3
SHA2567690cf92421b0b07838e0a046eb7aea7d80abc37dac65f6bb473e4d1a9395471
SHA512df141cec4f95987ec07565e28de1e9c09cde9218f7ac3281bca8f4fb4a59154a376e932b2c5b15e888f715b95dc04132cee7a65cafef4682cbddca984b1b7898
-
Filesize
64KB
MD5226e8c1560eacd206e56f08d30faaf9c
SHA18ef0702704433df0523de5fb569857f647b5838e
SHA256acb7f98165527213ca37d446ed38742b9bcbec5737ef29a75b8738953a1353d3
SHA51285a214edf800744e8959a4f4f2ad4dcefcdcca277eb5dae49d6fd35051d32f5b912e761cb51553fed9dd20b6c7c836fc136aa3e9ab4fb2f5b6f9cc9281ff9af2