Resubmissions

29-12-2022 04:38

221229-e9sm5acd27 10

29-12-2022 04:35

221229-e7y25acd23 10

10-11-2022 11:04

221110-m6r67ahcf6 10

10-11-2022 11:03

221110-m5vkxshce3 10

10-11-2022 11:00

221110-m37sgahcc4 10

10-11-2022 10:58

221110-m2wntahcb5 10

Analysis

  • max time kernel
    61s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2022 11:03

General

  • Target

    0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe

  • Size

    2.6MB

  • MD5

    bb266486ee8ac70c0687989e02cefa14

  • SHA1

    11203786b17bb3873d46acae32a898c8dac09850

  • SHA256

    0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479

  • SHA512

    a167779fc95a5cf0a3eff86211e9e08c282470e050b17ae62c7499a82ea59b3447446eafea9d7b5c5ba833b7a2d060f76530b00509dd5ff7904a0735d83e14c4

  • SSDEEP

    49152:rEqvaaAjc2hdKjb8WXqE1PiEbE/TKMt3/RgaJ2wW4PRT8O1:rbyaALKjwWXV1P9oVvwwW4JT8

Malware Config

Extracted

Path

\??\Z:\RECOVER-sykffle-FILES.txt

Ransom Note
>> Introduction Important files on your system was ENCRYPTED and now they have have "sykffle" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=TvXmSn6GUE0IdjOhdbGl9hEQ0eSR%2FFYVn2r51o1%2FmXfNuYDNmOgngH47ClDD%2FQTtwpouJ%2FDJ2TS8zbJXgTCV%2BIycMnHIUnu2Y33Nkysf6Mj%2BgUcVM5BgwFlAlXRIHda9lpy%2FajTP6p20gcEHc0El%2Br52V9bj6kDC5hYfwOlLvsaf6IvA7nkOS6%2BW69o6ZZAmRt4o1eOGBspciK%2BLFnZTzFT946qBdkKZPVphcI%2F2B8F6%2FZ1PUzOjpuqebvP1iU7c1U4v9Tlg95mDM73NSFpee1TXyixRXGjqrKy%2BMhLR5OCdR27%2F%2BaBDQnz1GzK6zt2yTKGWZAkv9Z%2F9G2yITMTTaA%3D%3D
URLs

http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21

http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=TvXmSn6GUE0IdjOhdbGl9hEQ0eSR%2FFYVn2r51o1%2FmXfNuYDNmOgngH47ClDD%2FQTtwpouJ%2FDJ2TS8zbJXgTCV%2BIycMnHIUnu2Y33Nkysf6Mj%2BgUcVM5BgwFlAlXRIHda9lpy%2FajTP6p20gcEHc0El%2Br52V9bj6kDC5hYfwOlLvsaf6IvA7nkOS6%2BW69o6ZZAmRt4o1eOGBspciK%2BLFnZTzFT946qBdkKZPVphcI%2F2B8F6%2FZ1PUzOjpuqebvP1iU7c1U4v9Tlg95mDM73NSFpee1TXyixRXGjqrKy%2BMhLR5OCdR27%2F%2BaBDQnz1GzK6zt2yTKGWZAkv9Z%2F9G2yITMTTaA%3D%3D

Extracted

Family

blackcat

Credentials
  • Username:
    KELLERSUPPLY\Administrator
  • Password:
    d@gw00d
  • Username:
    KELLERSUPPLY\AdminRecovery
  • Password:
    K3ller!$Supp1y
  • Username:
    .\Administrator
  • Password:
    d@gw00d
  • Username:
    .\Administrator
  • Password:
    K3ller!$Supp1y
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    false

  • enable_set_wallpaper

    true

  • extension

    sykffle

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

  • BlackCat

    A Rust-based ransomware sold as RaaS first seen in late 2021.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 4 IoCs
  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 42 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe
    C:\Users\Admin\AppData\Local\Temp\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe -a 12345
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c "wmic csproduct get UUID"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic csproduct get UUID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5108
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c "fsutil behavior set SymlinkEvaluation R2L:1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\fsutil.exe
        fsutil behavior set SymlinkEvaluation R2L:1
        3⤵
          PID:4492
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c "fsutil behavior set SymlinkEvaluation R2R:1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4712
        • C:\Windows\SysWOW64\fsutil.exe
          fsutil behavior set SymlinkEvaluation R2R:1
          3⤵
            PID:2112
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" /c "vssadmin.exe delete shadows /all /quiet"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3392
          • C:\Windows\system32\vssadmin.exe
            vssadmin.exe delete shadows /all /quiet
            3⤵
            • Interacts with shadow copies
            PID:5056
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c "reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\SysWOW64\reg.exe
            reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f
            3⤵
              PID:4104
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c "arp -a"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4288
            • C:\Windows\SysWOW64\ARP.EXE
              arp -a
              3⤵
                PID:4636
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd" /c "vssadmin.exe delete shadows /all /quiet"
              2⤵
                PID:2180
                • C:\Windows\system32\vssadmin.exe
                  vssadmin.exe delete shadows /all /quiet
                  3⤵
                  • Interacts with shadow copies
                  PID:2052
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1748
            • C:\Windows\System32\alg.exe
              C:\Windows\System32\alg.exe
              1⤵
              • Executes dropped EXE
              • Windows security modification
              • Enumerates connected drives
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • System policy modification
              PID:4364
            • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
              C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
              1⤵
              • Executes dropped EXE
              PID:4676
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
              1⤵
                PID:4408
              • C:\Windows\system32\fxssvc.exe
                C:\Windows\system32\fxssvc.exe
                1⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:3144
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe"
                1⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1416
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffdf5114f50,0x7ffdf5114f60,0x7ffdf5114f70
                  2⤵
                    PID:3788
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1640 /prefetch:2
                    2⤵
                      PID:4888
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2024 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1476
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2408 /prefetch:8
                      2⤵
                        PID:1128
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:1
                        2⤵
                          PID:3912
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:1
                          2⤵
                            PID:4296
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:1
                            2⤵
                              PID:3308
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4456 /prefetch:8
                              2⤵
                                PID:272
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4592 /prefetch:8
                                2⤵
                                  PID:5056
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4452 /prefetch:8
                                  2⤵
                                    PID:32
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4916 /prefetch:8
                                    2⤵
                                      PID:3716
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4348
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4968 /prefetch:8
                                      2⤵
                                        PID:2948
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5176 /prefetch:8
                                        2⤵
                                          PID:2052
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5328 /prefetch:8
                                          2⤵
                                            PID:4332
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:1
                                            2⤵
                                              PID:2032
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,6882544358440060313,16130862137309391431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3208 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3472
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2248
                                            • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              PID:228
                                              • C:\Windows\system32\WerFault.exe
                                                C:\Windows\system32\WerFault.exe -u -p 228 -s 404
                                                2⤵
                                                • Program crash
                                                PID:2168
                                            • C:\Windows\system32\WerFault.exe
                                              C:\Windows\system32\WerFault.exe -pss -s 476 -p 228 -ip 228
                                              1⤵
                                                PID:4620
                                              • C:\Windows\system32\vssvc.exe
                                                C:\Windows\system32\vssvc.exe
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3924
                                              • C:\Windows\system32\WerFault.exe
                                                C:\Windows\system32\WerFault.exe -pss -s 468 -p 932 -ip 932
                                                1⤵
                                                  PID:5084
                                                • C:\Windows\system32\WerFault.exe
                                                  C:\Windows\system32\WerFault.exe -u -p 932 -s 1760
                                                  1⤵
                                                  • Program crash
                                                  PID:2556

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  12bac4e0c33fcafa937f81f702a949d4

                                                  SHA1

                                                  aff39c54a6a66d4e13d5e8d41006c28a1c62c6ec

                                                  SHA256

                                                  d55f15a64b3e2878d99e183d5da67affa0f6bb9182b787364980a2afff3ae084

                                                  SHA512

                                                  680261aa10080425b6052b4fa9d8c3f98cd0b12529ec19f3b40f0ccd1fb8287fb332b8ad2056bd67fe0a37395739cff78b0b9fce4d8def60625df58d1307282a

                                                • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

                                                  Filesize

                                                  491KB

                                                  MD5

                                                  14131c42e1bbe7900672699f7e78fbab

                                                  SHA1

                                                  2e5f331d47b8b39bc21a9133a5e46677c4a2ec87

                                                  SHA256

                                                  7ccfe07efb1108df01f312ceb42c802c17285805557c779f32bbdce6096952ae

                                                  SHA512

                                                  6884a8943183a70c4c6b0f857ee6316027e6f326f19f1ba33ac97e483ffc468bac1d97fd459a4545d1c93b143b93c279a79ada75434e88a09d5e0e2e5af3d084

                                                • C:\Windows\System32\FXSSVC.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  e4d7ce746224b158b9f7d670a047afa0

                                                  SHA1

                                                  946baca71d95b05a0309d2c147e5746ce2dbf7a6

                                                  SHA256

                                                  8f91af819d13c909abbd3b2cff9a1f375f443edf61d1dac0b18ecf3c85093ea4

                                                  SHA512

                                                  f06ba0976a61aa9b8ebdba2a1288e233af4574e40da01585dff4e6d94c1d32becd078e255dae4cd8f710fb243a54f5489bbf29c92e6c196fa13e67095352f94b

                                                • C:\Windows\System32\alg.exe

                                                  Filesize

                                                  493KB

                                                  MD5

                                                  af5f92eefb668a8a53832ba190d513e3

                                                  SHA1

                                                  36e06c96215148194df9b0ddd11c9acd9ef204f4

                                                  SHA256

                                                  1421d7e961128bc026855afd7ba2ea7209a312bc432f7a71fecf369bcf012729

                                                  SHA512

                                                  60a519e400311d06b15ebdee922e05ca77cc6c1d373f478c9e9e3fcfcef8215871c6d7253581aa06b54ba79913b080c4bdf437f31f588ab3f23cafe0461f03b2

                                                • \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  12bac4e0c33fcafa937f81f702a949d4

                                                  SHA1

                                                  aff39c54a6a66d4e13d5e8d41006c28a1c62c6ec

                                                  SHA256

                                                  d55f15a64b3e2878d99e183d5da67affa0f6bb9182b787364980a2afff3ae084

                                                  SHA512

                                                  680261aa10080425b6052b4fa9d8c3f98cd0b12529ec19f3b40f0ccd1fb8287fb332b8ad2056bd67fe0a37395739cff78b0b9fce4d8def60625df58d1307282a

                                                • \??\c:\windows\system32\Appvclient.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  a926651e4077039ee03066016510fed8

                                                  SHA1

                                                  ddd5b8a1d524c248af5b1e1fe3a4b7ab2aa5103b

                                                  SHA256

                                                  185380239979f86391b207904ce82dcda7b556106bef28cddb3feb5d4923079c

                                                  SHA512

                                                  bf4b1c76f99d3b08fe0f84d268179835e85a44adb042775fb8c10df891c321f98363236a15749da55ff89ab6bcfe9c7c192c3bb6f4c2b77906afd46af6af8a88

                                                • \??\c:\windows\system32\fxssvc.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  e4d7ce746224b158b9f7d670a047afa0

                                                  SHA1

                                                  946baca71d95b05a0309d2c147e5746ce2dbf7a6

                                                  SHA256

                                                  8f91af819d13c909abbd3b2cff9a1f375f443edf61d1dac0b18ecf3c85093ea4

                                                  SHA512

                                                  f06ba0976a61aa9b8ebdba2a1288e233af4574e40da01585dff4e6d94c1d32becd078e255dae4cd8f710fb243a54f5489bbf29c92e6c196fa13e67095352f94b

                                                • memory/676-134-0x0000000000400000-0x00000000006C7000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/676-162-0x0000000000400000-0x00000000006C7000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/676-145-0x0000000000400000-0x00000000006C7000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/676-146-0x0000000000400000-0x00000000006C7000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/3144-152-0x0000000140000000-0x0000000140160000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/3144-153-0x0000000140000000-0x0000000140160000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/4364-148-0x0000000140000000-0x00000001400D5000-memory.dmp

                                                  Filesize

                                                  852KB

                                                • memory/4364-155-0x0000000140000000-0x00000001400D5000-memory.dmp

                                                  Filesize

                                                  852KB

                                                • memory/4364-159-0x0000000140000000-0x00000001400D5000-memory.dmp

                                                  Filesize

                                                  852KB

                                                • memory/4676-150-0x0000000140000000-0x00000001400D4000-memory.dmp

                                                  Filesize

                                                  848KB

                                                • memory/4676-164-0x0000000140000000-0x00000001400D4000-memory.dmp

                                                  Filesize

                                                  848KB