Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
19KB
-
MD5
046a0f4589e795692a06499a03448808
-
SHA1
18e1c7791a66a462113f60fe5e0f47894252d180
-
SHA256
e155851a7f80e2509610c22dc3721d44f04b3452ffac2675d85db7e66ce9e7b4
-
SHA512
21d815be1ba6ad4b1c437d8ad34212856483c71d5f35cf4d03522018ac71d14e8fb5729f7786a04782388408220147f5b018e1176e2f49198e1b542c53bdc6a1
-
SSDEEP
384:r0zGbDpmReVoOs4ji9ylKeGMjU8Hhhb3LKE7Io2paWhOwob0O+aIJCgMmV6:roCBVoOs4jmyI1MbBhbOSxWhOwob0/JO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0336e6b5bafda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96D938C1-1B4E-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000797aeb95bbe86f03dd4e038d63e7a872e2fa6594fd21a0cbbe4981736c8cfc3e000000000e8000000002000020000000102f7c842474e938a30df75584b75afd153c49ada3756cb941dd8584f136a99d2000000085283f2fabfedb1826cb84058a570a525ba6426a4099a3da41a9670a4bcdda6d400000008fc52941ac8b72932f47903c60c04db6b485014609ef47f75ff63eadbb8dc7cacac4567fe8a4d495ff8b9289114a7cb63aa181f2f94d12c7bbca208d331c6e46 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1076 chrome.exe 1076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe Token: SeShutdownPrivilege 1076 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3048 iexplore.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe 1076 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 3048 wrote to memory of 3016 3048 iexplore.exe 28 PID 1076 wrote to memory of 1660 1076 chrome.exe 31 PID 1076 wrote to memory of 1660 1076 chrome.exe 31 PID 1076 wrote to memory of 1660 1076 chrome.exe 31 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2876 1076 chrome.exe 33 PID 1076 wrote to memory of 2868 1076 chrome.exe 34 PID 1076 wrote to memory of 2868 1076 chrome.exe 34 PID 1076 wrote to memory of 2868 1076 chrome.exe 34 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35 PID 1076 wrote to memory of 2148 1076 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e49758,0x7fef6e49768,0x7fef6e497782⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:22⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1492 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2116 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1300 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:22⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2652 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3440 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1284,i,2523762212323096183,13286491237685811921,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3068
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ad8bb82b29d9d2f192161a338062ba
SHA137985600dfc2f28d1b0199e6b811d922d0f3f0f9
SHA256fa97f2c38dac2a2b5e0a81b1140250ccf29d6e1ea267efd799b376843ec56554
SHA5122cb8ce89e74d67c6c724addcc7a630741e2916b3558dbaa3419331236b002ab6372ab625da28323f54148425475d185b2eb78c7948d68c9b0678f2370b1b216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6498a80bb959e68e84c2e5fc0203596
SHA1854827b3a430dbadbe22a71667e123fafdc05f61
SHA256fb297e0590cc07695ad65e61d8aac56dd8b28d6f5e1cfb742d0eb9557a8758c2
SHA51204b821febdb751b8dfbaa6aec5d809523f2a219f5b38c5e1ae2917fef3ffc53a8336476938d1dd60e66c96bb0ef6239de7cbb4d3fe290612f4fead65580c625b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e41330d0edcddf2099f98db5219742c
SHA1dfce6fce55c0c13c1f13c29041d97a8aece6599f
SHA256d62aa240f91a81f56eb8316094f065d1eaff29efa49a7047c9cb65f5abc23249
SHA512b18698db1925029d6af1fcf3847c493ac7d18568de6a9526bc0e3463788aadbc995e64099552fd21141c4729cdf1290e1587af24a05f477deaa9639098aa7c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce09fb65f126884743c71ed2ac556264
SHA14513f3b5129a29d4f030fc00f665468918246eac
SHA25612fd9edf30b61f957a72e1098351f2d5fd462dcc2877c7a769b01d7387ea49eb
SHA512edddc5c97599785f2dc444c288bb88c079ad9dcb03a8edd67baa73d05f50cbcfe82259f989339d4371b838752ffdbfd2d1373fd0e48e36fb2bdbe0fe51dcf5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d35ea76d36c60ea40f3a8d1c12c740d1
SHA18425224dadf02a71358c89fe7642be04cdc43622
SHA2560fc3af766ad91cc649c8e7912988f9e9b23a4baf3ae6487b5509bdd663e4f2c1
SHA512bdd9ea74c642729f2873b1b6e2875b53aea04841def9fa672aeb9ef30ac31e70ed82618a5e13462679936628974aed4b53b81c609ec9b02a90cf656c80fc1238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524af61cd38cefa1d11df493fee193552
SHA1ca6f46f19a37223daa06335127914e0b2db0c4fb
SHA2560bac2a008a93eac28284cfbe26fc351515216780dcd3c9527bcd2bb256587584
SHA5122b3cf1a8fe722a5e2f33478c5baf692f3126a62b4e4a2d7a89f297753390591f27980a6e7983d19893294d2bd22795f077816944475d621ee73e32ae02289404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e476a09a7de458c85d350fbbafae451
SHA1cce724155f888dff9790498293aff1362e80bcd0
SHA25682eda103ae75d851b3760987d4a966e61d33d33c6f28ad2ca113d549370d9acd
SHA512341a7cc82cb7fd1e19b356a1be0e5d24d602b6925364a23a6b17bc40e9ef3237c9d42baa43e1a4cee582290de739396711d01c2d95ffef6f5e210862544658db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f2d8986f3bbe7b99a6e171aca5af93
SHA1a5c4f01d5a1b4f08efe9c4e6841269eeb742e267
SHA256d47c02e6ba22eaf49b4f5f6a3f9600ed460f7dde5761378fdb9e7843cf216a97
SHA512a0f1a53f304d1f9466adbe1be3bcf7c22104948c3a5cc9d28624c4330c9da1e30d846947500860b43b25066bcb6104f9a596e9a8d3cc59e3815e0d283d50a72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58411745647531566c2eccf82a1aad2c1
SHA12132e1bf1b5f7dfc8b696b737512ca90ef8a6b2a
SHA2564143098ef77aa8e6a9f0c42073ea2012873cce120c1722f9d7bd8af06edcbd8c
SHA512d032e00fd75853783e41d8c0f1e4509f9809229969427bc81010151d2a867dffd0d1b66ea071a8f71bffc54a00d6c7c0183d75de00b161a94f9b5e411e0afa1a
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
282KB
MD5a1686b1937d807f2695b351bb33216e2
SHA188edaef8b92d413bc3c9d86950a2fb1ff4d20e56
SHA256aab1838d4245f1d4a2fcb40925fef4ec0f0e9bbbbbeee612310adebcad3060c2
SHA512ffc49ec371cd6530f274379096bc3a321585a40c677527ff23019048fbc76f5a9eb5ac9ba2c983960ce7e8e98ab4fa22ce2f8d2523144dd6e1aecdcdd509b0ab
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
16KB
MD53b95dce44f2fd1cc2cb43740607a6cdf
SHA10512d00cb8faf44ed68a915946dcedc44a85c9b8
SHA256871e1b913d3149e951aab90c627928cf84e0784f232d92c312b9c19335b8c4ef
SHA512803a92c59c8629316bfe5a2d2e0df6ff24016de4ee597bd6b7669c11f3a5047cf79cb1adb93c65f0fcacc2baed059fa3019b761dc99539f0e367c691e01d0ff6