Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 19:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1tg7Owyw18Vepr_VqTr9Q_scdSOj4Xeff?usp=sharing_eil&invite=COzci7IC&ts=674f4fa3
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1tg7Owyw18Vepr_VqTr9Q_scdSOj4Xeff?usp=sharing_eil&invite=COzci7IC&ts=674f4fa3
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 20 drive.google.com 21 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2972 msedge.exe 2972 msedge.exe 3248 identity_helper.exe 3248 identity_helper.exe 4796 msedge.exe 4796 msedge.exe 2352 msedge.exe 2352 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 384 2972 msedge.exe 83 PID 2972 wrote to memory of 384 2972 msedge.exe 83 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 4284 2972 msedge.exe 84 PID 2972 wrote to memory of 2432 2972 msedge.exe 85 PID 2972 wrote to memory of 2432 2972 msedge.exe 85 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86 PID 2972 wrote to memory of 3192 2972 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1tg7Owyw18Vepr_VqTr9Q_scdSOj4Xeff?usp=sharing_eil&invite=COzci7IC&ts=674f4fa31⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe67d946f8,0x7ffe67d94708,0x7ffe67d947182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=4852 /prefetch:62⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2172,4432257173868313532,16912515301476821973,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5184 /prefetch:62⤵PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
32KB
MD51f76396a01f9b997d149642fa19395bd
SHA1f26dd69ff0c45d7fcd9553f0cc5caeaf5410cffe
SHA256c519c5d085e60c32c52df7706f00daddd219415a5aa2c45d2d7d9dad1e5ac849
SHA5120153e322815e320bbb18042488bffc0bd7a7c6c063c9919284086496c58865e4da89b3606c0f58e1b7c0a07380dddb2e2a59f967966868c21c26670c215064c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD563bde2803ad5972a36282f08fe8a42a3
SHA17c5c543880a2c902ac1c97437b90727e06578623
SHA2565a949a34ca1ffe7a3d8d9595560873caaed3bab9febbd64f0eaef531bb321d04
SHA512f26a85130ab6938834d609e6ef698563c854a81d45679f29c794f7200bfae3653743ec0b38660c962c32272c57d4da451aa1f430fe13bdf249fa482c9fa4e688
-
Filesize
4KB
MD5a564817fd363cc8f24421712a3e6dd40
SHA1a8a5fb31d9972fce3f123ce4abb0cc5891ffb9cc
SHA25693db7209ddea1d6708265c865ba3abd66638666aad2a14b6b83a1a6174b267ea
SHA5125cc56bcf6d5c2d80938dacb8ef4833970b6b01d39d37fd9f3bc5e45dcff21f843fd2f2a24c5f3953755e259af9ff400c2619100f52c15e51b445e092c293beb2
-
Filesize
6KB
MD5cd74941564caeff85f2e481cd0eb17d0
SHA11d116f79f7963e83c10dd9c73aff74e83056a265
SHA256bcb6715ecc0343763c1fe15a9cd0463f65676ef369124fa98a72fe03925fc8cf
SHA512726213cfa5df34eb6cfe75a98e0d4373cd1e2098dffd67b6f15b946b4c92311bbed9fadef839fef62f70c7cc9717b78f0f9b14ef4b43342fe46203e9db8f62b1
-
Filesize
6KB
MD5d10e4cfb27fd2decf5b5906421631ce7
SHA17732fb40f20d32009a5674879c4cfce049a0b80d
SHA256064a5b44d8f5a483273cb0572afa2fc792ff077043e7019736e55bd2b689d0cd
SHA512ce01da83e4fc0971047fe2c204281bef1a9878af256268f2050d558ffc3a13fd50b1a2d3f1508a4dff8b2f418a02c0b823b3ac84484be4ddb40fec2b6c5bf650
-
Filesize
6KB
MD5c0d409807abae4600feb6854c61755e7
SHA1f7d9fc718e992a638af79a64acddf9b29d48d636
SHA256121a7dfb8e12f428677255b3efd11cabe36e0f56c045e935e3700ba31afdd53a
SHA5124fcfee56a17df4c00a660a3e1b8bad55c4bea027de5d796d701cd485e4572c950e97bc18940391eda881e98c86278f5e631c396b4bb12a43b7feb863cfcaa921
-
Filesize
5KB
MD50c001422257757322788d002939aee4a
SHA1a15df5117f2a7b2d5d887cb02794fb569bda2b0f
SHA25675a8194c352830f9b20efd5bf8df2008d38c5c2e189112a8ebbc56d48eecb928
SHA512dc06cdf828030ebf886a2676637a4a1b9b0fd583ed8e9a01a0f948c3698c2de5937dc1d8c5b7779c204fbbb90fbf0e9ea0dd0309ca957ebaf01925caceb66303
-
Filesize
6KB
MD58818dac52a4e61d80e3273b7ed6ced21
SHA1f43a5de26565e9e365b7584cad57cdf31117624a
SHA2568181891ef871eab1a408339025bcabd6c4c9656b4360fda5def8931294a62cbc
SHA5121e1cec5e95ec90d5ca88b2f134282436d2ac9ed62b2d4b58ace30de3dcbb24bb33c7135c1e5ff1482d44758fd6942cf45b7613815a5999d2d2f0e68a50a6158a
-
Filesize
1KB
MD58131f73c656388b04b09d91df52e7fac
SHA1f76468ada72ae52ae88e38ed3969a3713edf51fa
SHA25676a922e25d947a3233d4277bd6f90c45212ff6aaebd9f80fbcc837172459dbcb
SHA512f37e03b5cb8ab5145129b990d7e197151099b8b11a359dad7d4986da5d84d8ff20e6d86d31fea1e9cf68f25c5bc99169f62b4836621234a303b076b77be75a63
-
Filesize
1KB
MD5f070acbd8de296b8594910a0619a8757
SHA15cacb30c847539281355525dc43842cabeff4162
SHA256ccd0e8f0fd3901b31a318798e8f2a94547db7a0327b5a1cb1b51cc2770280dd5
SHA5129ff3044a969b598b747dfc827c408c37c07d34258ce76924612355112cfcaa1082d4931bdd51ebc2868135474c796f84232a38289873928a765e9d235da3dd0a
-
Filesize
1KB
MD5423fce642420acba712d3ef86e98a48e
SHA1cd2baccebbc9d09fb4cd608051dc07c0b48b6326
SHA25607f6870d0c79a305714a2fc1b6cb08cd931b53216aca0bbd6f08932eac938921
SHA512d558f22264a3c23c66e3c501d7f9f447709b91cb8bd4d53563b1adb957c81e5ce95c6c18bd96cf78390ce4d12251ec16472fa723fa1c234a5155fb1b74a7f5bb
-
Filesize
1KB
MD53a0d3dcda9f9988a50b775cf9af56f5a
SHA1fdcc793bb527c61d9a18a94a82c516df28d026a7
SHA256960b6e6c7ac21c17e19dddcbd88457b46875d1f07ff6e55043a15f377252e0ce
SHA51243aa2063c95f4ea95fb8e8a907968636a4d445e32520ef3026c247cc8243232ccd42facfc00e11f4f3fdeaf19849eb8f577696c91436654792734aa895322e4f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56625d1a0100195ed16c00115056c9482
SHA1ee1aaf38e29bbf22dbc0a44768c4c5f5949dd606
SHA25651f38c770940eb5eda8c11a839fd1a2fd0880fcdd3949ad0287609d3814a8dc5
SHA512f06f76da60683305f90106bc1f24d33a66b38ff7cc979e3ff2c1965116bc4fc60379b66d0369c15a73c919ff21906a4c6abea31e01608f7fdafbbf3526b63df1