Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 19:16
Static task
static1
Behavioral task
behavioral1
Sample
03288446b918eadc1e31e48d1b15d05556937954befe96f62ab1823fd738f8f4.dll
Resource
win7-20240903-en
General
-
Target
03288446b918eadc1e31e48d1b15d05556937954befe96f62ab1823fd738f8f4.dll
-
Size
2.3MB
-
MD5
dd01d5022842b21194cf143296c66000
-
SHA1
3df58bacd26c53a3c5f2228d9048c81922f947b7
-
SHA256
03288446b918eadc1e31e48d1b15d05556937954befe96f62ab1823fd738f8f4
-
SHA512
72a341bf4cc400a55a62cc1e3f5ed45a790c2df8f22d98c8e01561d5d47fbcb960f0f3bd75df7c11938ab0dc59611f2fb8a27a6ce47332fdb744ea8017952e63
-
SSDEEP
49152:wU3U+ZYmxjpv7x4GFM/+b8dTMNh9Wr73h7NXSWEqNJO5hYTVMCRisKEy:wiU2YmxjpDx4Zo8dYNh9q73h7NXYkRiN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1628 rundll32mgr.exe 2056 WaterMark.exe -
Loads dropped DLL 4 IoCs
pid Process 2108 rundll32.exe 2108 rundll32.exe 1628 rundll32mgr.exe 1628 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/1628-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1628-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1628-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1628-16-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1628-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1628-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1628-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2056-41-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2108-30-0x0000000000210000-0x0000000000236000-memory.dmp upx behavioral1/memory/2056-93-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2056-660-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libflac_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mshwjpnr.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACEWSTR.DLL svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jawt.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_cycle_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEOLEDB.DLL svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACETXT.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfr.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\WindowsBase.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Entity.Design.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\libconsole_logger_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXPSRV.DLL svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\GROOVEEX.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\npjp2.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\libvlccore.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libtransform_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libpanoramix_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\penusa.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACECORE.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\WindowsFormsIntegration.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationProvider.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.IdentityModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.IdentityModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\Microsoft.Build.Conversion.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\liblive555_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html svchost.exe File opened for modification C:\Program Files\Windows Media Player\wmpenc.exe svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHEV.DLL svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_stats_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_delay_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsftp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_srt_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawdv_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\flyout.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jsound.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\journal.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libsdl_image_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_vc1_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files\Java\jre7\bin\jsoundds.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtrivial_channel_mixer_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libmosaic_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACEODBCI.DLL svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\libGLESv2.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_standard_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libclone_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\settings.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libqsv_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\extensibility.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSSOAP30.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnoseek_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\glib-lite.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kcms.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2068 2108 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2056 WaterMark.exe 2056 WaterMark.exe 2056 WaterMark.exe 2056 WaterMark.exe 2056 WaterMark.exe 2056 WaterMark.exe 2056 WaterMark.exe 2056 WaterMark.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2056 WaterMark.exe Token: SeDebugPrivilege 2632 svchost.exe Token: SeDebugPrivilege 2108 rundll32.exe Token: SeDebugPrivilege 2068 WerFault.exe Token: SeDebugPrivilege 2056 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1628 rundll32mgr.exe 2056 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2008 wrote to memory of 2108 2008 rundll32.exe 30 PID 2108 wrote to memory of 1628 2108 rundll32.exe 31 PID 2108 wrote to memory of 1628 2108 rundll32.exe 31 PID 2108 wrote to memory of 1628 2108 rundll32.exe 31 PID 2108 wrote to memory of 1628 2108 rundll32.exe 31 PID 2108 wrote to memory of 2068 2108 rundll32.exe 32 PID 2108 wrote to memory of 2068 2108 rundll32.exe 32 PID 2108 wrote to memory of 2068 2108 rundll32.exe 32 PID 2108 wrote to memory of 2068 2108 rundll32.exe 32 PID 1628 wrote to memory of 2056 1628 rundll32mgr.exe 33 PID 1628 wrote to memory of 2056 1628 rundll32mgr.exe 33 PID 1628 wrote to memory of 2056 1628 rundll32mgr.exe 33 PID 1628 wrote to memory of 2056 1628 rundll32mgr.exe 33 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2760 2056 WaterMark.exe 34 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2056 wrote to memory of 2632 2056 WaterMark.exe 35 PID 2632 wrote to memory of 256 2632 svchost.exe 1 PID 2632 wrote to memory of 256 2632 svchost.exe 1 PID 2632 wrote to memory of 256 2632 svchost.exe 1 PID 2632 wrote to memory of 256 2632 svchost.exe 1 PID 2632 wrote to memory of 256 2632 svchost.exe 1 PID 2632 wrote to memory of 336 2632 svchost.exe 2 PID 2632 wrote to memory of 336 2632 svchost.exe 2 PID 2632 wrote to memory of 336 2632 svchost.exe 2 PID 2632 wrote to memory of 336 2632 svchost.exe 2 PID 2632 wrote to memory of 336 2632 svchost.exe 2 PID 2632 wrote to memory of 384 2632 svchost.exe 3 PID 2632 wrote to memory of 384 2632 svchost.exe 3 PID 2632 wrote to memory of 384 2632 svchost.exe 3 PID 2632 wrote to memory of 384 2632 svchost.exe 3 PID 2632 wrote to memory of 384 2632 svchost.exe 3 PID 2632 wrote to memory of 392 2632 svchost.exe 4 PID 2632 wrote to memory of 392 2632 svchost.exe 4 PID 2632 wrote to memory of 392 2632 svchost.exe 4 PID 2632 wrote to memory of 392 2632 svchost.exe 4 PID 2632 wrote to memory of 392 2632 svchost.exe 4 PID 2632 wrote to memory of 432 2632 svchost.exe 5 PID 2632 wrote to memory of 432 2632 svchost.exe 5 PID 2632 wrote to memory of 432 2632 svchost.exe 5 PID 2632 wrote to memory of 432 2632 svchost.exe 5 PID 2632 wrote to memory of 432 2632 svchost.exe 5
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1260
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:496
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:820
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1168
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:864
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2368
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:272
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:276
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1064
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2420
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1752
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03288446b918eadc1e31e48d1b15d05556937954befe96f62ab1823fd738f8f4.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03288446b918eadc1e31e48d1b15d05556937954befe96f62ab1823fd738f8f4.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize237KB
MD511fa8cc12342b36a1f3b677738b36c39
SHA1f136b7d17d92da47e5917e4f94d00b79cc51f975
SHA256cb850ea3e968f84cd1bb6f13632b4d25a6395876aa5d9baec45cdc41900d40c3
SHA512619f863c0cbb78b7e86b907a25c78925f44f4b0b84dc1eeab7740b3deb0964747b40fb740e452c676b26229abc436df8251ec868cd769ab8a3ae604091d25539
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize233KB
MD559b799676a068df21a44b1baa0584347
SHA1c8d624d6b269773f764f079dd3144ca343a03328
SHA256ddf00316105b4d195157d47eaff2c8dc1afa5ea92e3f1b7df772b95edcae4ba5
SHA512e798c9592f1063d5d0ae249a33e28c549a9896b4ebe88682345518c290cee007373a597feda9de2a846476acad5d851ce09e1961c2ee1fa8434fd3f7725d0c89
-
Filesize
112KB
MD5ce1aa52cd296575a6ae8792017dd2f25
SHA10f0fb1624fcf139f0bc85e5ecc4cf8065d6b88d1
SHA256bb2ebaa9bb1abe4bc9f171c576b9d9e1b5577474174bd9952c687d2c18291b09
SHA51207bac53caf40d086c0695683c411773a5b486b524485a82385135b5feada62b6fe83841e2c6e95d382365e1adc0a8474def7ca11409edcf3a419b975a77a7b2c