Overview
overview
3Static
static
1UCenter_Ho...it.ps1
windows7-x64
3UCenter_Ho...it.ps1
windows10-2004-x64
3UCenter_Ho...cy.ps1
windows7-x64
3UCenter_Ho...cy.ps1
windows10-2004-x64
3UCenter_Ho...up.ps1
windows7-x64
3UCenter_Ho...up.ps1
windows10-2004-x64
3UCenter_Ho...ex.htm
windows7-x64
3UCenter_Ho...ex.htm
windows10-2004-x64
3UCenter_Ho...ad.htm
windows7-x64
3UCenter_Ho...ad.htm
windows10-2004-x64
3UCenter_Ho...um.htm
windows7-x64
3UCenter_Ho...um.htm
windows10-2004-x64
3UCenter_Ho...pp.htm
windows7-x64
3UCenter_Ho...pp.htm
windows10-2004-x64
3UCenter_Ho...up.htm
windows7-x64
3UCenter_Ho...up.htm
windows10-2004-x64
3UCenter_Ho...ck.htm
windows7-x64
3UCenter_Ho...ck.htm
windows10-2004-x64
3UCenter_Ho...og.htm
windows7-x64
3UCenter_Ho...og.htm
windows10-2004-x64
3UCenter_Ho...he.htm
windows7-x64
3UCenter_Ho...he.htm
windows10-2004-x64
3UCenter_Ho...or.htm
windows7-x64
3UCenter_Ho...or.htm
windows10-2004-x64
3UCenter_Ho...nt.htm
windows7-x64
3UCenter_Ho...nt.htm
windows10-2004-x64
3UCenter_Ho...ig.htm
windows7-x64
3UCenter_Ho...ig.htm
windows10-2004-x64
3UCenter_Ho...it.htm
windows7-x64
3UCenter_Ho...it.htm
windows10-2004-x64
3UCenter_Ho...on.htm
windows7-x64
3UCenter_Ho...on.htm
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/admincp_credit.ps1
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/admincp_credit.ps1
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/admincp_privacy.ps1
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/admincp_privacy.ps1
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/admincp_usergroup.ps1
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/admincp_usergroup.ps1
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/index.htm
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/index.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/ad.htm
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/ad.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/album.htm
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/album.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/app.htm
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/app.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/backup.htm
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/backup.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/block.htm
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/block.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/blog.htm
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/blog.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/cache.htm
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/cache.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/censor.htm
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/censor.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/comment.htm
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/comment.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral27
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/config.htm
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/config.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral29
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/credit.htm
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/credit.htm
Resource
win10v2004-20240730-en
Behavioral task
behavioral31
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/cron.htm
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/cron.htm
Resource
win10v2004-20240730-en
General
-
Target
UCenter_Home_1.5RC1_SC_utf8/upload/admin/tpl/backup.htm
-
Size
11KB
-
MD5
4177b4e313d985e5fd7ae251c928a483
-
SHA1
f279ece84b5144dec4a02168c245db9d0c56a897
-
SHA256
2449cd3ad71b59263c1caa5680e01ee8e6c59a88fd6f7b17a3b3b121a73fe121
-
SHA512
828f41eb1818799fc661c452329eb7ad8b10f73ee19dbfa60b313c30e44da115dd8fc9c54e8e2207f882a57ee6b42b5a8d4800ccbb20aac78168ab7f4e101c94
-
SSDEEP
96:/qY7FcA/Q4QUlG7jKXUFmMffMcfCWyqR6cVlZuO9twbOwgrX+cxtB5G/BWqvBfns:iAFcMQ4QUlijOt/FgrY/+Ipi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2636 msedge.exe 2636 msedge.exe 936 msedge.exe 936 msedge.exe 2612 identity_helper.exe 2612 identity_helper.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 936 wrote to memory of 2624 936 msedge.exe msedge.exe PID 936 wrote to memory of 2624 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2332 936 msedge.exe msedge.exe PID 936 wrote to memory of 2636 936 msedge.exe msedge.exe PID 936 wrote to memory of 2636 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe PID 936 wrote to memory of 212 936 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\UCenter_Home_1.5RC1_SC_utf8\upload\admin\tpl\backup.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe29c246f8,0x7ffe29c24708,0x7ffe29c247182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,15490884496508694868,11043588079879138627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ea9ef805116c4ab90b5800c7cd94ab71
SHA1eb9c7b8922c8ef79eef1009ab7f530bb57fbbbea
SHA256bff3e3629de76b8b8dd001c3d8fb986e841c392dfe1982081751b92f5bd567b0
SHA5128c907d2616ce16cfe08ddeb632f93402e765c5d9430a46e90ab5ea32d4df0a854c6007b19f9b0168254ab7aadf720fed8c68d1a055704db09c1b36c201a9b3b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5347755403306a2694773b0c232d3ab2c
SHA194d908aa90533fcaef3f1eb5aa93fee183d5f6ac
SHA256d43f2dd4ac5b6ba779100eb8b84bc92fc8700bedcd339a801c5260b1bb3ce3bf
SHA51298f1fb18bc34dfc224132dfa2a2e6a131b280b25fcb516fac3bb66da2a47c7a7061124881de6fa5f65602663dc0ea71357b171a3346bb1514176943438322253
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5c36faa10fc69d35c7fbf6195c24d19e3
SHA14b287f6e7a243fbddfe7df227d9529a993f1fa77
SHA2564df55c6f659dccace6f8299ff67b4e39b78e2726c11a37fd1fa44a1c3c25b454
SHA5127a19fdab6a299c2270740500b1e0591f783b558eeb8da11ed362f945ec5ca40b0d8d870ee39ffaf3876e63b7d6bcc03b12318f01af637b7173c773e0f0ca7c41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD571f85a8e2ea0c8e23a02a534ff524f70
SHA10f35e66f92b1534024f9e4f78e1c99e58e4bbcb8
SHA256f5b84f8e15d6fffa58f3871e8f99f0a886829039eef367c65194675af3745ebd
SHA512bd551d5003a9ac36135768fa71523c663ab6857b52af5c030906c88e837505aca1392acbe34113059ba214198b496a7018c8a65c6b0e6ea10b7492d1c257915a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5081224bf73b6262b939f74e5e8c5dbf3
SHA1662cc4c3aaf3b4de513f38d2a6a9f3e1114089d7
SHA2567d6b289246d9c78b3547cb4dfe3b268063bd09057e87001182bf0e618767d85f
SHA5122ec548c13fcb9116411037c18abc19955a9bb5985fc5ba030cd9b3529d80ca5a62b7618686ce8432a9953bfcc64bc7a640b656867df2f8f63f1d7b54669933fe
-
\??\pipe\LOCAL\crashpad_936_IDVCVNBIVHURSWCDMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e