Analysis
-
max time kernel
126s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 04:37
Behavioral task
behavioral1
Sample
a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
a806274443a44fcd6df8d509dc2ed3df
-
SHA1
84402ee8a3d159e03e3ecd76bf4b1a7900e3c5e6
-
SHA256
5a182174b54750cebab5c620f101561692e1904e5c357f4ee9bc077d0a068aee
-
SHA512
77e55a138f596db3c45a84fefbfc2ec5730765aaa6d33cb47f10318d55b0a688d1938c9722defe11c4e44eabdcb678898b2a00fc7f6d1ce0de2a4a537031a061
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ5:0UzeyQMS4DqodCnoe+iitjWwwl
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe -
Executes dropped EXE 26 IoCs
pid Process 2432 explorer.exe 5040 explorer.exe 1508 spoolsv.exe 4552 spoolsv.exe 4224 spoolsv.exe 4304 spoolsv.exe 4284 spoolsv.exe 4208 spoolsv.exe 3208 spoolsv.exe 2636 spoolsv.exe 4468 spoolsv.exe 4532 spoolsv.exe 2364 spoolsv.exe 3980 spoolsv.exe 3996 spoolsv.exe 3220 spoolsv.exe 3172 explorer.exe 3040 spoolsv.exe 3376 spoolsv.exe 2948 explorer.exe 3464 spoolsv.exe 1588 spoolsv.exe 3256 spoolsv.exe 3408 spoolsv.exe 220 explorer.exe 3536 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4284 set thread context of 1148 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 102 PID 2432 set thread context of 5040 2432 explorer.exe 104 PID 1508 set thread context of 3220 1508 spoolsv.exe 118 PID 4552 set thread context of 3376 4552 spoolsv.exe 121 PID 4224 set thread context of 1588 4224 spoolsv.exe 124 PID 4304 set thread context of 3408 4304 spoolsv.exe 126 -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 3220 spoolsv.exe 3220 spoolsv.exe 3376 spoolsv.exe 3376 spoolsv.exe 1588 spoolsv.exe 1588 spoolsv.exe 3408 spoolsv.exe 3408 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3028 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 90 PID 4284 wrote to memory of 3028 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 90 PID 4284 wrote to memory of 1148 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 102 PID 4284 wrote to memory of 1148 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 102 PID 4284 wrote to memory of 1148 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 102 PID 4284 wrote to memory of 1148 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 102 PID 4284 wrote to memory of 1148 4284 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 102 PID 1148 wrote to memory of 2432 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 103 PID 1148 wrote to memory of 2432 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 103 PID 1148 wrote to memory of 2432 1148 a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe 103 PID 2432 wrote to memory of 5040 2432 explorer.exe 104 PID 2432 wrote to memory of 5040 2432 explorer.exe 104 PID 2432 wrote to memory of 5040 2432 explorer.exe 104 PID 2432 wrote to memory of 5040 2432 explorer.exe 104 PID 2432 wrote to memory of 5040 2432 explorer.exe 104 PID 5040 wrote to memory of 1508 5040 explorer.exe 105 PID 5040 wrote to memory of 1508 5040 explorer.exe 105 PID 5040 wrote to memory of 1508 5040 explorer.exe 105 PID 5040 wrote to memory of 4552 5040 explorer.exe 106 PID 5040 wrote to memory of 4552 5040 explorer.exe 106 PID 5040 wrote to memory of 4552 5040 explorer.exe 106 PID 5040 wrote to memory of 4224 5040 explorer.exe 107 PID 5040 wrote to memory of 4224 5040 explorer.exe 107 PID 5040 wrote to memory of 4224 5040 explorer.exe 107 PID 5040 wrote to memory of 4304 5040 explorer.exe 108 PID 5040 wrote to memory of 4304 5040 explorer.exe 108 PID 5040 wrote to memory of 4304 5040 explorer.exe 108 PID 5040 wrote to memory of 4284 5040 explorer.exe 109 PID 5040 wrote to memory of 4284 5040 explorer.exe 109 PID 5040 wrote to memory of 4284 5040 explorer.exe 109 PID 5040 wrote to memory of 4208 5040 explorer.exe 110 PID 5040 wrote to memory of 4208 5040 explorer.exe 110 PID 5040 wrote to memory of 4208 5040 explorer.exe 110 PID 5040 wrote to memory of 3208 5040 explorer.exe 111 PID 5040 wrote to memory of 3208 5040 explorer.exe 111 PID 5040 wrote to memory of 3208 5040 explorer.exe 111 PID 5040 wrote to memory of 2636 5040 explorer.exe 112 PID 5040 wrote to memory of 2636 5040 explorer.exe 112 PID 5040 wrote to memory of 2636 5040 explorer.exe 112 PID 5040 wrote to memory of 4468 5040 explorer.exe 113 PID 5040 wrote to memory of 4468 5040 explorer.exe 113 PID 5040 wrote to memory of 4468 5040 explorer.exe 113 PID 5040 wrote to memory of 4532 5040 explorer.exe 114 PID 5040 wrote to memory of 4532 5040 explorer.exe 114 PID 5040 wrote to memory of 4532 5040 explorer.exe 114 PID 5040 wrote to memory of 2364 5040 explorer.exe 115 PID 5040 wrote to memory of 2364 5040 explorer.exe 115 PID 5040 wrote to memory of 2364 5040 explorer.exe 115 PID 5040 wrote to memory of 3980 5040 explorer.exe 116 PID 5040 wrote to memory of 3980 5040 explorer.exe 116 PID 5040 wrote to memory of 3980 5040 explorer.exe 116 PID 5040 wrote to memory of 3996 5040 explorer.exe 117 PID 5040 wrote to memory of 3996 5040 explorer.exe 117 PID 5040 wrote to memory of 3996 5040 explorer.exe 117 PID 1508 wrote to memory of 3220 1508 spoolsv.exe 118 PID 1508 wrote to memory of 3220 1508 spoolsv.exe 118 PID 1508 wrote to memory of 3220 1508 spoolsv.exe 118 PID 1508 wrote to memory of 3220 1508 spoolsv.exe 118 PID 1508 wrote to memory of 3220 1508 spoolsv.exe 118 PID 3220 wrote to memory of 3172 3220 spoolsv.exe 119 PID 3220 wrote to memory of 3172 3220 spoolsv.exe 119 PID 3220 wrote to memory of 3172 3220 spoolsv.exe 119 PID 5040 wrote to memory of 3040 5040 explorer.exe 120 PID 5040 wrote to memory of 3040 5040 explorer.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a806274443a44fcd6df8d509dc2ed3df_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3172 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2228
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3376 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2948 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:848
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3408 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
PID:220
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4284 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1900
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3620
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4208 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3208 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1212
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4404
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:116
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1160
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:608
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5100
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4296
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1660
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5056
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:848
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3040 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:756
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:648
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3204
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4596
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2220
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3808
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3600
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4524
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD54da6d9123f5eca6414a6aabfa6d4c32f
SHA1af8dae1322f9e37bb2465f13d2f0a8c7ae45ba59
SHA256de284a48a91c899210163951a6a5234122850ddbd49cba97495ae8abe08af525
SHA51236c0285c6a0183acea33b0c262a0f45788816dc1a5595c2eef336eb917d63bc2d63d78e551cba8facc548774b1c0a5144d0875b9d450971728c79421a762b05a
-
Filesize
2.2MB
MD5533487fa63702a559b6406abee3121fe
SHA1ed4aba26c6b1df331b6925d855c600a3c003f85e
SHA256452af98b1f525b7de45dac1b659b2f6d8440bd78f6144534269ec898878ea97b
SHA512327871a4cacecf5ce527738e55b046cc700408b6a47901e7a202868cccd06060cac1b04bb925d967573b54ce515a6c297a0a31a3f8b7d44fa60d50172c31634e