Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-01-2022 13:03
Static task
static1
Behavioral task
behavioral1
Sample
a5dcc0d9f44de85e8895ebb37aab0639.exe
Resource
win7-en-20211208
General
-
Target
a5dcc0d9f44de85e8895ebb37aab0639.exe
-
Size
219KB
-
MD5
a5dcc0d9f44de85e8895ebb37aab0639
-
SHA1
dec6df7d20dec256a0a5547fb9e4f297b1dd96f7
-
SHA256
932382f377c00f267e7f102d6fb94aa69d6052302106d3578511e8c70e82bb70
-
SHA512
986e4a3733ea4340d5a4ec41e6f6d9a8fa67bdf346df7afc375ae201724a5a926405ce6d576745d5dd913132229ebc5fe9fbe551db0dec728d91d4790990afce
Malware Config
Extracted
remcos
1.7 Pro
Host
pvtrans.ydns.eu:3030
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
svchost.exe
-
copy_folder
Microsoft Window Client
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Microsoft Window Clinet
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_oxhfteubwm
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
svchost
-
take_screenshot_option
false
-
take_screenshot_time
5
- take_screenshot_title
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 1284 svchost.exe 600 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/1772-63-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1772-64-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1772-65-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1772-67-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1772-70-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/600-91-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/600-92-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1508 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1508 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a5dcc0d9f44de85e8895ebb37aab0639.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a5dcc0d9f44de85e8895ebb37aab0639.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft Window Client\\svchost.exe\"" a5dcc0d9f44de85e8895ebb37aab0639.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft Window Client\\svchost.exe\"" svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
a5dcc0d9f44de85e8895ebb37aab0639.exesvchost.exesvchost.exedescription pid process target process PID 1588 set thread context of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1284 set thread context of 600 1284 svchost.exe svchost.exe PID 600 set thread context of 1136 600 svchost.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029a8fa03d77d0143b95f148165a5bc9200000000020000000000106600000001000020000000a50fdf04c7a9f10cde5d5367ac0aa7ae6438c6e22f54dc34affdad68c0874db1000000000e800000000200002000000063e3d4146968d93bbd9f56adc990ab754ecb462aa80bab6bb5576b64d5164597200000003b94f78aef656efe1893265625066b9d58cf237480a62e74a213f811cedc248d40000000f788bc5be51eb3fb19bb27c4d4e168bef6d759c2226103a5ba20539acee29edc9a034ce06846b0c5ba89c986d65ed9b2021c47b2316b275ef2b22d5c6e6af997 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "349880848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54C340C1-7DDF-11EC-AF3B-7EB9569AE3EA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cfba31ec11d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exesvchost.exepowershell.exepid process 1528 powershell.exe 600 svchost.exe 1924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 520 iexplore.exe 520 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a5dcc0d9f44de85e8895ebb37aab0639.exea5dcc0d9f44de85e8895ebb37aab0639.execmd.exesvchost.exesvchost.exeiexplore.exeiexplore.exedescription pid process target process PID 1588 wrote to memory of 1528 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe powershell.exe PID 1588 wrote to memory of 1528 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe powershell.exe PID 1588 wrote to memory of 1528 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe powershell.exe PID 1588 wrote to memory of 1528 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe powershell.exe PID 1588 wrote to memory of 852 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe schtasks.exe PID 1588 wrote to memory of 852 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe schtasks.exe PID 1588 wrote to memory of 852 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe schtasks.exe PID 1588 wrote to memory of 852 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe schtasks.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1588 wrote to memory of 1772 1588 a5dcc0d9f44de85e8895ebb37aab0639.exe a5dcc0d9f44de85e8895ebb37aab0639.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1772 wrote to memory of 1508 1772 a5dcc0d9f44de85e8895ebb37aab0639.exe cmd.exe PID 1508 wrote to memory of 1624 1508 cmd.exe PING.EXE PID 1508 wrote to memory of 1624 1508 cmd.exe PING.EXE PID 1508 wrote to memory of 1624 1508 cmd.exe PING.EXE PID 1508 wrote to memory of 1624 1508 cmd.exe PING.EXE PID 1508 wrote to memory of 1284 1508 cmd.exe svchost.exe PID 1508 wrote to memory of 1284 1508 cmd.exe svchost.exe PID 1508 wrote to memory of 1284 1508 cmd.exe svchost.exe PID 1508 wrote to memory of 1284 1508 cmd.exe svchost.exe PID 1284 wrote to memory of 1924 1284 svchost.exe powershell.exe PID 1284 wrote to memory of 1924 1284 svchost.exe powershell.exe PID 1284 wrote to memory of 1924 1284 svchost.exe powershell.exe PID 1284 wrote to memory of 1924 1284 svchost.exe powershell.exe PID 1284 wrote to memory of 1612 1284 svchost.exe schtasks.exe PID 1284 wrote to memory of 1612 1284 svchost.exe schtasks.exe PID 1284 wrote to memory of 1612 1284 svchost.exe schtasks.exe PID 1284 wrote to memory of 1612 1284 svchost.exe schtasks.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 1284 wrote to memory of 600 1284 svchost.exe svchost.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 600 wrote to memory of 1136 600 svchost.exe iexplore.exe PID 1136 wrote to memory of 520 1136 iexplore.exe iexplore.exe PID 1136 wrote to memory of 520 1136 iexplore.exe iexplore.exe PID 1136 wrote to memory of 520 1136 iexplore.exe iexplore.exe PID 1136 wrote to memory of 520 1136 iexplore.exe iexplore.exe PID 520 wrote to memory of 1624 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 1624 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 1624 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 1624 520 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5dcc0d9f44de85e8895ebb37aab0639.exe"C:\Users\Admin\AppData\Local\Temp\a5dcc0d9f44de85e8895ebb37aab0639.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HuzKkvOaVDHCNb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HuzKkvOaVDHCNb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp71B7.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\a5dcc0d9f44de85e8895ebb37aab0639.exe"C:\Users\Admin\AppData\Local\Temp\a5dcc0d9f44de85e8895ebb37aab0639.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HuzKkvOaVDHCNb.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HuzKkvOaVDHCNb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5BB.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.07⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
4de133c09d0772f2b2032993c3e1c34a
SHA1eb11f944f62816336b7928ca84184435dbc49aa4
SHA2560d921f8e8f7acb3ec6bc07cb530b63cbc51edc2a057a2ea720160489f42b0a2e
SHA5122671bd4a243e3232d8050477f5b48d665c8cb3b2fbe426b70f5bb1fd90828c16f383ff57d57d514ff9fdfe7b9ad585d9ed11b67eddfa404b2d52ab7167a715f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
3458a27acb3a1624b22f8d40e9d755a4
SHA11531e8aef83fae6ca18e8ffacccaf3163bea2cd0
SHA25688e5d5445b0cdfbfbaa7e351c54ea70a3e68d7c3d4679bfc42ef164e7e6534d0
SHA512cae501a8cf4f13c683dad5d6265dad88785d96d73da28ade5b16cd302b7722c565bdef8e688070eace03483f758ab9261eb03e041358afea1075b49af4531af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
1cc12e347536b339e1174a7b3ee8ce6b
SHA1889cec8403841781777c43b19a4e20d921f3a052
SHA256bebba1583c3b78ff3702d12a386ee71c7a8ac80667692539bc50922546538de0
SHA5127b802629dd54a8df73f3d74785606bc0e38089c5a89783d94b87f5032782c256406f34d9786ff9de76d952397206e90d075151a413905d4700ec53d94bfa6a78
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\o5rwqiw\imagestore.datMD5
46ddfe630120551304476485a349aeb6
SHA1fe698e5e20982a0c431aa2aff2f4fc0f5f40ae90
SHA2563299df2a1cb950c46a0c40f00479a71d53830e8f98bf71cb0e6320aad418792d
SHA512b6b9774db90bf6dd6366a2bb6c299ed85f4aa1a99f1dba08170a2394c94c33a48eabdd8204c5d27b54d569042728cd86872f0e9eba44ffd7139d65d69858daf5
-
C:\Users\Admin\AppData\Local\Temp\install.batMD5
617b3071d93c16dac48d9f571b94443e
SHA14ccb339a960d3cac523d0e081ba4f6772cd1b865
SHA25638b2d89f8ec584cc9f60697ca365c646cedb8caf619acfd9f2a059d016b1b9c5
SHA512f72c3aaa94633618673582a8ec3c77e470b55f48492840e3499bbbde3efeb009dc5060ae0b2bdbb04c73b6dbefa24448839c90f866dbc1221962a8f11e8fab19
-
C:\Users\Admin\AppData\Local\Temp\tmp5BB.tmpMD5
78ee1c15f294f584b940ad3d158d3a87
SHA1619d00977c3e72b5577aead261cc68901d41019f
SHA256cb145d9fb34705a3b7c5ec664cc1aebac0f2044816e5df33f58a852b66fb33f4
SHA512edb6b76b6b069c4ca54e8cf440a8ee3b4ee6056c4882d087de67e5500a83dd823bb45f7a367ee03c941efd06aead96cd11b6ecced20df811308b88b4e365fc3a
-
C:\Users\Admin\AppData\Local\Temp\tmp71B7.tmpMD5
78ee1c15f294f584b940ad3d158d3a87
SHA1619d00977c3e72b5577aead261cc68901d41019f
SHA256cb145d9fb34705a3b7c5ec664cc1aebac0f2044816e5df33f58a852b66fb33f4
SHA512edb6b76b6b069c4ca54e8cf440a8ee3b4ee6056c4882d087de67e5500a83dd823bb45f7a367ee03c941efd06aead96cd11b6ecced20df811308b88b4e365fc3a
-
C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exeMD5
a5dcc0d9f44de85e8895ebb37aab0639
SHA1dec6df7d20dec256a0a5547fb9e4f297b1dd96f7
SHA256932382f377c00f267e7f102d6fb94aa69d6052302106d3578511e8c70e82bb70
SHA512986e4a3733ea4340d5a4ec41e6f6d9a8fa67bdf346df7afc375ae201724a5a926405ce6d576745d5dd913132229ebc5fe9fbe551db0dec728d91d4790990afce
-
C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exeMD5
a5dcc0d9f44de85e8895ebb37aab0639
SHA1dec6df7d20dec256a0a5547fb9e4f297b1dd96f7
SHA256932382f377c00f267e7f102d6fb94aa69d6052302106d3578511e8c70e82bb70
SHA512986e4a3733ea4340d5a4ec41e6f6d9a8fa67bdf346df7afc375ae201724a5a926405ce6d576745d5dd913132229ebc5fe9fbe551db0dec728d91d4790990afce
-
C:\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exeMD5
a5dcc0d9f44de85e8895ebb37aab0639
SHA1dec6df7d20dec256a0a5547fb9e4f297b1dd96f7
SHA256932382f377c00f267e7f102d6fb94aa69d6052302106d3578511e8c70e82bb70
SHA512986e4a3733ea4340d5a4ec41e6f6d9a8fa67bdf346df7afc375ae201724a5a926405ce6d576745d5dd913132229ebc5fe9fbe551db0dec728d91d4790990afce
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JOWTSPBE.txtMD5
0b58178d71fc4cb9c9911649221a6d05
SHA1e561e3b2a2a2438f9f9e3b866de5b80244573544
SHA25608b33fbf2753f2b93f4fa99f214f5918dafc528e0cff2da99126fe922eb2a4ad
SHA512aa2c73e8a6cb218ebbffc3e5f067a425cc2705dfbed3c926576d6080896889c6fab25048031057445b7b2507d1d09e88e03ece5e2f12e8a400e3d0f267292a22
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msMD5
4e3fa9969b19389049bf3d44ee7d2099
SHA110bc947879e41c1601341a6cce3d1e9ec3fef9b6
SHA2563fe1248f124ad9f8e6ec7345261690c52f0224e663652ab52bd43f9fe519b665
SHA51245ca5f26523b3f10cc9aa2812ff397a34e8e7af2c71f40b031e20324706ae59820d82fe718821374297afcc62925e6ec7760365cb7eca8d852831d8f013588ce
-
\Users\Admin\AppData\Roaming\Microsoft Window Client\svchost.exeMD5
a5dcc0d9f44de85e8895ebb37aab0639
SHA1dec6df7d20dec256a0a5547fb9e4f297b1dd96f7
SHA256932382f377c00f267e7f102d6fb94aa69d6052302106d3578511e8c70e82bb70
SHA512986e4a3733ea4340d5a4ec41e6f6d9a8fa67bdf346df7afc375ae201724a5a926405ce6d576745d5dd913132229ebc5fe9fbe551db0dec728d91d4790990afce
-
memory/600-91-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/600-92-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/600-93-0x0000000000401000-0x000000000041D000-memory.dmpFilesize
112KB
-
memory/1284-81-0x000000007EF40000-0x000000007EFA0000-memory.dmpFilesize
384KB
-
memory/1284-80-0x0000000004F60000-0x0000000004F61000-memory.dmpFilesize
4KB
-
memory/1284-78-0x0000000000A20000-0x0000000000A5E000-memory.dmpFilesize
248KB
-
memory/1528-74-0x0000000002460000-0x00000000030AA000-memory.dmpFilesize
12.3MB
-
memory/1528-73-0x0000000002460000-0x00000000030AA000-memory.dmpFilesize
12.3MB
-
memory/1588-59-0x00000000007B0000-0x00000000007E4000-memory.dmpFilesize
208KB
-
memory/1588-55-0x0000000076151000-0x0000000076153000-memory.dmpFilesize
8KB
-
memory/1588-56-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/1588-57-0x000000007EF40000-0x000000007EFA0000-memory.dmpFilesize
384KB
-
memory/1588-58-0x0000000000470000-0x000000000047E000-memory.dmpFilesize
56KB
-
memory/1588-54-0x0000000000FD0000-0x000000000100E000-memory.dmpFilesize
248KB
-
memory/1772-64-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1772-62-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1772-63-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1772-65-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1772-67-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1772-70-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1772-71-0x0000000000401000-0x000000000041D000-memory.dmpFilesize
112KB
-
memory/1924-94-0x0000000002410000-0x000000000305A000-memory.dmpFilesize
12.3MB