Overview
overview
7Static
static
3MatDeckSetup.exe
windows7-x64
7MatDeckSetup.exe
windows10-2004-x64
7SCADA.exe
windows7-x64
1SCADA.exe
windows10-2004-x64
1SoftwareUp...in.exe
windows7-x64
1SoftwareUp...in.exe
windows10-2004-x64
1USBDEV_LIB.dll
windows7-x64
1USBDEV_LIB.dll
windows10-2004-x64
1VMD.exe
windows7-x64
1VMD.exe
windows10-2004-x64
7VirtumentU...al.pdf
windows7-x64
1VirtumentU...al.pdf
windows10-2004-x64
1XlsLib.dll
windows7-x64
1XlsLib.dll
windows10-2004-x64
3biodaq.dll
windows7-x64
1biodaq.dll
windows10-2004-x64
1biodaqutil.dll
windows7-x64
1biodaqutil.dll
windows10-2004-x64
1ftd2xx.dll
windows7-x64
1ftd2xx.dll
windows10-2004-x64
1imageformats/qgif.dll
windows7-x64
1imageformats/qgif.dll
windows10-2004-x64
1imageforma...eg.dll
windows7-x64
1imageforma...eg.dll
windows10-2004-x64
1imageformats/qsvg.dll
windows7-x64
1imageformats/qsvg.dll
windows10-2004-x64
1lessons/Le...nt.pdf
windows7-x64
1lessons/Le...nt.pdf
windows10-2004-x64
1lessons/Le...ph.pdf
windows7-x64
1lessons/Le...ph.pdf
windows10-2004-x64
1libMPSSE.dll
windows7-x64
1libMPSSE.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 16:14
Behavioral task
behavioral1
Sample
MatDeckSetup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
MatDeckSetup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
SCADA.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
SCADA.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
SoftwareUpdaterAdmin.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
SoftwareUpdaterAdmin.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
USBDEV_LIB.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
USBDEV_LIB.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
VMD.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
VMD.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
VirtumentUserManual.pdf
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
VirtumentUserManual.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
XlsLib.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
XlsLib.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
biodaq.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
biodaq.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
biodaqutil.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
biodaqutil.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
ftd2xx.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
ftd2xx.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
imageformats/qgif.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
imageformats/qgif.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
imageformats/qjpeg.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
imageformats/qjpeg.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
imageformats/qsvg.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
imageformats/qsvg.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
lessons/Lesson 1 - MatDeck document.pdf
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
lessons/Lesson 1 - MatDeck document.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
lessons/Lesson 9 - 3D graph.pdf
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
lessons/Lesson 9 - 3D graph.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
libMPSSE.dll
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
libMPSSE.dll
Resource
win10v2004-20240611-en
General
-
Target
lessons/Lesson 9 - 3D graph.pdf
-
Size
175KB
-
MD5
69b5f43756435fbdf6b43befee332444
-
SHA1
efc3ac6191de53b8ee6f610704f1b94fc917c306
-
SHA256
b557018669d0b2d685d202410dbb73ddfdc5948799a4a17005871296d4dac067
-
SHA512
38fe5808859c32d772332a09dd3b209e479b63c6004ad6113bda94394bf141c734bf7e36751cdc55d34608a8f2c1d8679185a693b8f83ad723879ea885202ed3
-
SSDEEP
3072:sxm9GX6LmA/0IEF1TJqkasELieS3GkeEKP6YbnHutZqAsCYmI8R:0oc8i1T3fVGJEKCQOtR
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3280 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3280 AcroRd32.exe 3280 AcroRd32.exe 3280 AcroRd32.exe 3280 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 4380 3280 AcroRd32.exe 84 PID 3280 wrote to memory of 4380 3280 AcroRd32.exe 84 PID 3280 wrote to memory of 4380 3280 AcroRd32.exe 84 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1752 4380 RdrCEF.exe 85 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86 PID 4380 wrote to memory of 1564 4380 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lessons\Lesson 9 - 3D graph.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9785CBC4E2AC58C2DFA106DF491C2EEC --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9C2F91F80A11C5FE4C030A31C09BC497 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9C2F91F80A11C5FE4C030A31C09BC497 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:1564
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=41C661A691749ED6BED010DE096D176B --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4508
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DBA013682CB292D1D903DB44882EE281 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DBA013682CB292D1D903DB44882EE281 --renderer-client-id=5 --mojo-platform-channel-handle=1960 --allow-no-sandbox-job /prefetch:13⤵PID:1888
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=583564DEE3ADF9BAF6C03B2697B72C94 --mojo-platform-channel-handle=2452 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2480
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=446D3FFDA96E8CC2F29BBB7B2989C0EC --mojo-platform-channel-handle=2404 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ccc59b14c831b178dd71d7a88d3b6e76
SHA161efb72376aee229283ece64f1a080134234f82f
SHA2567ffaedbadcdcfeffba544288283782691bf7a8dab68ffe6f505d806bc92eb59b
SHA512211d510ffbd5bdf4e0ced0fc178ba5fba3264cf132ec3bca00407d72da9487bde61c7b4f1bc63c0b6dfedfc6fc746b9103fc70ab1f7d1f79fec2e3ea6bec0961
-
Filesize
64KB
MD55ff801dfff43f96bc05fae2128f52d74
SHA175c01a5098ebf34667b305e5664a941b84d74a06
SHA25674e7a917e7483061ee3a850faaf1bcff9847a919c7abf0e310062f800e817b98
SHA512d3d6adebe2876e8b3a3c6bf12c328fd72391e4743329447781689f22b0d826fe9b4120434ef052850c505a90a30c10061788a9b9af97d2810ce7d4af426564d9