Analysis

  • max time kernel
    105s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2024 21:18

General

  • Target

    https://www.upload.ee/files/14414499/TikTokSpammverV2.zip.html

Malware Config

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Growtopia

    Growtopa is an opensource modular stealer written in C#.

  • Growtopia family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.upload.ee/files/14414499/TikTokSpammverV2.zip.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffc3ec546f8,0x7ffc3ec54708,0x7ffc3ec54718
      2⤵
        PID:2492
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:2
        2⤵
          PID:1500
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4828
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:8
          2⤵
            PID:2032
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
            2⤵
              PID:3468
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              2⤵
                PID:3548
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:1
                2⤵
                  PID:4248
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                  2⤵
                    PID:2344
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                    2⤵
                      PID:632
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                      2⤵
                        PID:1388
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1
                        2⤵
                          PID:532
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                          2⤵
                            PID:4952
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:1
                            2⤵
                              PID:1708
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6468 /prefetch:1
                              2⤵
                                PID:5092
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:1
                                2⤵
                                  PID:4928
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7040 /prefetch:1
                                  2⤵
                                    PID:808
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:1
                                    2⤵
                                      PID:5408
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6864 /prefetch:8
                                      2⤵
                                        PID:5588
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6864 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5764
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:1
                                        2⤵
                                          PID:5912
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                                          2⤵
                                            PID:5996
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:1
                                            2⤵
                                              PID:6084
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:1
                                              2⤵
                                                PID:2976
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:1
                                                2⤵
                                                  PID:3724
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                                                  2⤵
                                                    PID:5532
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:1
                                                    2⤵
                                                      PID:5544
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6492 /prefetch:8
                                                      2⤵
                                                        PID:516
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:1
                                                        2⤵
                                                          PID:5500
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7292 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5412
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2080
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2196,14870685235926896820,638838410542480119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3188
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:5100
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:4228
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:432
                                                            • C:\Windows\system32\NOTEPAD.EXE
                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\TikTokSpammverV2 (1)\httpproxies.txt
                                                              1⤵
                                                                PID:1256
                                                              • C:\Users\Admin\Downloads\TikTokSpammverV2 (1)\Tiktok.exe
                                                                "C:\Users\Admin\Downloads\TikTokSpammverV2 (1)\Tiktok.exe"
                                                                1⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2528
                                                                • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                                                                  2⤵
                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                  • Executes dropped EXE
                                                                  • Windows security modification
                                                                  PID:6116
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "powershell" Get-MpPreference -verbose
                                                                    3⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:5976
                                                                • C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Client.exe"
                                                                  2⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4616
                                                                  • C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe"
                                                                    3⤵
                                                                    • Drops startup file
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4232
                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE
                                                                      4⤵
                                                                      • Modifies Windows Firewall
                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4972
                                                              • C:\Windows\system32\taskmgr.exe
                                                                "C:\Windows\system32\taskmgr.exe" /7
                                                                1⤵
                                                                • Drops startup file
                                                                • Checks SCSI registry key(s)
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:400

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                d7cb450b1315c63b1d5d89d98ba22da5

                                                                SHA1

                                                                694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                                SHA256

                                                                38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                                SHA512

                                                                df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                37f660dd4b6ddf23bc37f5c823d1c33a

                                                                SHA1

                                                                1c35538aa307a3e09d15519df6ace99674ae428b

                                                                SHA256

                                                                4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                                SHA512

                                                                807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                984B

                                                                MD5

                                                                ab90c0b8dacdf0215e10a723579ba778

                                                                SHA1

                                                                e8fd2e21a3a562318e59032cb92c9a219ac81277

                                                                SHA256

                                                                e11be86c1714de0b75e5c126fc1e2be0d27b0bc2e65ea3203f6322736579855d

                                                                SHA512

                                                                dfc6c90523f3a7f8bf895db1356a8c3a8177d1c7e1673dbcda64bb8a64072e8f1fc0764f8564f446e4c6db357e1f5abbb4781c841da7c78b85cd30d528c8021a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001

                                                                Filesize

                                                                41B

                                                                MD5

                                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                                SHA1

                                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                SHA256

                                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                SHA512

                                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                12c017c34d242c7db8a39783ccd099ae

                                                                SHA1

                                                                9c169d82d64f3c5c95aed119b0f56a8afa5bf741

                                                                SHA256

                                                                fd80db4d4973fb800a59715fdd64112706949e5e17f0ecd778d9a75e11a4ec33

                                                                SHA512

                                                                1552ed10a4f7a9101bcd403a8a4690293f1f911c2f77e3cf8acc10f5e4709941afd21434883e0ea0555688b1e9032c6a404904093326429aa1fc0e364253c0a4

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                c8563441bde4df85f0fbc8783668e332

                                                                SHA1

                                                                6b8833a90674a1065672aa9fc2a911c98acbde3f

                                                                SHA256

                                                                a5f88daefae43b95ce341a17d350a00ea6eaf858e2fefd8ca6066610646400ed

                                                                SHA512

                                                                d1c43588eb782353f15eb7538b36bccba35b919af430dd0729598d36974420e14e9b885c506087dffed5174d6131a44dec6ea022b5c7b63ea5c3af1ca43e26d1

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                996c00f159278c53a65e2ce9220cdbf2

                                                                SHA1

                                                                7613d46397e5a890e279b540cf949cf9864ffcfe

                                                                SHA256

                                                                fa2fa11db2ec4202565a18975851404618436e1958170266feeeb6ad0b91bc3a

                                                                SHA512

                                                                387a3754a0b3d4c4f41e47aef9db83559abf8b627a71f3f858298d29f51e5df2c9b04e366a190ff7add625a0329a2be40d4dc24508274dfbdde9d3b5fe7102d4

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                af767dc89f8492263023d2ee37a92dbb

                                                                SHA1

                                                                56b1bb8e5f53b4d961a6b9b6239b1582846ff5e8

                                                                SHA256

                                                                a92467868e87b4a6dd7ab10d40249971ab8a52593989a59c7b5591266b5420fa

                                                                SHA512

                                                                502d528a84d32d5ac33160337d9487d243d54ffc60dc23669d9847ccda03f442f3151e1a22ac933ab0fc4d445e560b390346db6e5d9f1dfdc2d2dc9db8f73229

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                d64442fffeb8b6c98a644af3b210da0a

                                                                SHA1

                                                                c83ce564ca68fdcceb3dd7403b27e33ad8a532ae

                                                                SHA256

                                                                4d835a173d33fb2c47d674b2febb1b458dff8ddb4f348acad0cd9e3661e2f4ad

                                                                SHA512

                                                                b464760f584c5422aff85f8560e465ae35b6ad84f507b902988e2f934f82977cf75067898977e1bab4b4716c72f4bdb59add0a6e5a6fb93417a5f7fb897fd104

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                9d4f2a39acb06c83b6026e65f35a9088

                                                                SHA1

                                                                000947a0e4b176eba0e6388382021439cb9b1d41

                                                                SHA256

                                                                fdfc5ed0877e6b0ac3ee861987bd4d86202940671f9eb25e7e07d3bacce3e52c

                                                                SHA512

                                                                fd646286acefc14bf7082586d9c20d248dc0a589eff1ab3ece5e03e506082b1d839874448c10dcd9db5eaf6206592cc0acbb700d5b4366cbe12d323f96b2c72b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                048e73b11a247255ffcf56a7df9c5a6b

                                                                SHA1

                                                                2f1f00bf65419084731048706aeab85b17cdaf9d

                                                                SHA256

                                                                1582bd36679fea2899aff17568da225a940d4d4987aa572e26059d4f932a1e45

                                                                SHA512

                                                                db5962761d8d22f77dcf22b444363b215f1db75d29fe89828fa537fe5cfd7ecfe4e8842e0e41df84c33fac0aeb95e8e71eb8ac1cf5e7a6822c1813e2cdb418b0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ff01.TMP

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                0bc1934da3b80d3cdd13c931670792cb

                                                                SHA1

                                                                80fadb41e204d13fcf95731e54eb4af289688a8a

                                                                SHA256

                                                                49f7e452da2b9d1d9d11ef588785385af506bb27d35c255fd812b3ccd1cf7550

                                                                SHA512

                                                                7b1c9017c4d7cf59f38668becae281e5baeb4fac260ea1e0c3fefd3d9d1a058797e4dfbc9bb7bb761b32ff422be9a6fefb9cdd2ddc2e22a74ea14dce8391cc7b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                46295cac801e5d4857d09837238a6394

                                                                SHA1

                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                SHA256

                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                SHA512

                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                206702161f94c5cd39fadd03f4014d98

                                                                SHA1

                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                SHA256

                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                SHA512

                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f40971dd-c134-42d4-8b8e-89094d850e03.tmp

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                98c7e5a97e0e28297b15aea3469a171b

                                                                SHA1

                                                                34f469724b53a95b4ecdb5691a04eacf115a03ad

                                                                SHA256

                                                                c8494862ce429c7820a7a9a5c8999543f27ef111981b1f635bcb7e5007fb3cab

                                                                SHA512

                                                                ae22fa5a9b25712d80efbfc444613d969a9d97269b3945efb3b24934e75d67f8e03b952a7139b02a08eeb91ac15f887c9f55ea5c872ea31c5d1d4518de8da10a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                03475172f8c03b998859c53b8ea26667

                                                                SHA1

                                                                7a15198cfe321b95be7fec74f249bd0036c7187f

                                                                SHA256

                                                                c55a64b4f0063c511236b51e58612844a98f88ed312520e67207c2e225b02042

                                                                SHA512

                                                                f05a7c9d993b74fb1393ec5ab80fe34941b5eacad86e6c0ba2420f017a3e23f34b5e3b7a1179cdf62995019ec7a6ce20299727c6a12db328d03f4031e4788d3a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                6812debe1e5d04821479b970d654418f

                                                                SHA1

                                                                b66e83ae22d12ad0e028264f6f3a1a1d74006e5a

                                                                SHA256

                                                                4eacd6677e0d809d7df12090deb38a7efe8059fd1f7d09f3162f08601b9020de

                                                                SHA512

                                                                8ec8a67ce00de9ade251658c0f32f89ca66977698cba66733a9db2ff97f2db954281efd619514397a8857e27475f5a8c1dfc5d577bf7de9022d98f7a71f49bf1

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                eaf85337f5b98dd4928ae653df97b417

                                                                SHA1

                                                                9b3175fb40f7bd329b6a9775c1267a0aaf23eb7f

                                                                SHA256

                                                                032087c456ced022504b053ca142e7a77145d04e460675649b3e2a529e732571

                                                                SHA512

                                                                4e4ab612bc38aaba345ff016611a7708333fdd6ee9f3a3d764516733cfd2d3dc8d1fda209dead04a998d618d0c698f45710adba69094364f0b83f7fb897c8783

                                                              • C:\Users\Admin\AppData\Local\Temp\Client.exe

                                                                Filesize

                                                                157KB

                                                                MD5

                                                                bfd1e9b97962411eff00c43d708f8eac

                                                                SHA1

                                                                c7ce399fbbf0470ec231f31b4d5a232fcac736fb

                                                                SHA256

                                                                a0239e76203a2d5954718777d622ad807ccfa06a9b03410ad0185989244b0f21

                                                                SHA512

                                                                0d838156472b2d5dd2c7be17c62a09d1444917fc8cecc1db2f80767ec164420aafd57c146c52d4b6ed74f7f8d885d23ad4e5c8f76049813e17b63e794240b767

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jbvgr4hl.l3d.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Local\Temp\windef.exe

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                64a7e0429947daec5c28503be3d0d7ac

                                                                SHA1

                                                                c86c62a7f49ccb499af8eebf22950fc54dcb9bdd

                                                                SHA256

                                                                6fc10838bdf49d8dfdd5d28e223be97e3813924d9ba116ac4c3dc40e2170e772

                                                                SHA512

                                                                74c432e51a513c969e1525a9eb0babb740d0b62b81f330971fb700e47c897cfa1842aa0d4fe594219ec450654300205d6ebd77678fe8ffdcac19fcb6716814a6

                                                              • C:\Users\Admin\Downloads\3c9e01ea-a825-4567-b10a-2ee7e66386ca.tmp

                                                                Filesize

                                                                186KB

                                                                MD5

                                                                38c30db0ae73299705c8f0c7995f59a3

                                                                SHA1

                                                                feb72fd4e90a2baa908f90eac5e3d4c5115d3dab

                                                                SHA256

                                                                b307aa107a9a6e6a77869942adc998d46c5dda16dae0bf0e0deefd67141a59f5

                                                                SHA512

                                                                9a5ab68a14efd5e35835055493d0741c6d1753cdfee5588293ebf8a6382c5d180fb6376bbcc4984f6cc186cb4a5a17668e6244e279aa52e8af7760bb4032e1af

                                                              • memory/400-386-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-398-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-395-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-396-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-397-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-392-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-393-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-394-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-387-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/400-388-0x0000028D5E210000-0x0000028D5E211000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2528-285-0x0000000000E70000-0x0000000000EAA000-memory.dmp

                                                                Filesize

                                                                232KB

                                                              • memory/2528-286-0x00000000057F0000-0x000000000584A000-memory.dmp

                                                                Filesize

                                                                360KB

                                                              • memory/2528-287-0x000000000A550000-0x000000000AAF4000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/2528-288-0x0000000005AC0000-0x0000000005B52000-memory.dmp

                                                                Filesize

                                                                584KB

                                                              • memory/2528-289-0x0000000005A50000-0x0000000005A5A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/5976-319-0x0000023AA09B0000-0x0000023AA09D2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/6116-309-0x0000000000B20000-0x0000000000B28000-memory.dmp

                                                                Filesize

                                                                32KB