Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 02:04
Behavioral task
behavioral1
Sample
a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe
Resource
win10v2004-20240611-en
General
-
Target
a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe
-
Size
91KB
-
MD5
27b0d082805df80e464ea4080726289b
-
SHA1
e4fb571cc62855c5325df088caa25fb263d33c83
-
SHA256
a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998
-
SHA512
9986a6bd518eb0caccbbb7160e9c61034927f506b65fc7b0a3f5a9e1be40cd44bead11c3c7d6a3580ec42dc407c865f884d933a69566877cb97bd236524ddb72
-
SSDEEP
1536:kRsjd3GR2Dxy387Lnouy8VTYRsjd3GR2Dxy387Lnouy8VTY:kOgUXoutNYOgUXoutNY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 512 xk.exe 1028 IExplorer.exe 4212 WINLOGON.EXE 3152 CSRSS.EXE 3344 SERVICES.EXE 3904 LSASS.EXE 1504 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002342f-8.dat upx behavioral2/files/0x0007000000023433-106.dat upx behavioral2/memory/512-108-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023437-112.dat upx behavioral2/memory/512-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1028-118-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023439-120.dat upx behavioral2/files/0x000700000002343a-126.dat upx behavioral2/memory/4212-127-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3152-134-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002343b-133.dat upx behavioral2/memory/3344-138-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002343c-141.dat upx behavioral2/memory/3904-142-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002343d-146.dat upx behavioral2/memory/3904-148-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1504-152-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/116-154-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe File created C:\Windows\SysWOW64\shell.exe a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe File created C:\Windows\SysWOW64\Mig2.scr a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe File created C:\Windows\SysWOW64\IExplorer.exe a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe File created C:\Windows\xk.exe a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\Desktop\ a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 512 xk.exe 1028 IExplorer.exe 4212 WINLOGON.EXE 3152 CSRSS.EXE 3344 SERVICES.EXE 3904 LSASS.EXE 1504 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 116 wrote to memory of 512 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 85 PID 116 wrote to memory of 512 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 85 PID 116 wrote to memory of 512 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 85 PID 116 wrote to memory of 1028 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 86 PID 116 wrote to memory of 1028 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 86 PID 116 wrote to memory of 1028 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 86 PID 116 wrote to memory of 4212 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 87 PID 116 wrote to memory of 4212 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 87 PID 116 wrote to memory of 4212 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 87 PID 116 wrote to memory of 3152 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 88 PID 116 wrote to memory of 3152 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 88 PID 116 wrote to memory of 3152 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 88 PID 116 wrote to memory of 3344 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 89 PID 116 wrote to memory of 3344 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 89 PID 116 wrote to memory of 3344 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 89 PID 116 wrote to memory of 3904 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 90 PID 116 wrote to memory of 3904 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 90 PID 116 wrote to memory of 3904 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 90 PID 116 wrote to memory of 1504 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 91 PID 116 wrote to memory of 1504 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 91 PID 116 wrote to memory of 1504 116 a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe"C:\Users\Admin\AppData\Local\Temp\a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:116 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:512
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4212
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3344
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3904
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5038c8cad23b4f370841784895040d04b
SHA1283499dd22c43a2be706c86516ae1ad3a2b8e1ec
SHA2567199dac2e567f34fddf59d6810d0a99f5b3c4af7911e1779ac4b520e54a7ff1d
SHA5125c744263bc34a12768a106823e2f0b35a1da452676dfcd5d92764d0c477145f16c8780b83f6c1302c208036969d2685f16190198b71f1958378520152f0141ee
-
Filesize
91KB
MD54af08e523d6848680fcd4a791cb4a19f
SHA10658116c1e95c7df588c12d951c97068ef8d7e80
SHA256dcaaba9cd309ed454bbbcd69754f64d2f759c97598f56de20c699f257d58f939
SHA51240c695896da03fc5247251ee5ca4febff6ef1fedead00de70a3600283012881786e86453556c9ff08dd88b25c81bbcdec3f8a5c6d5bbb10735ee40dd18aaf6fd
-
Filesize
91KB
MD541ea086e48725a2f70a823d3c472e03d
SHA16ec2445e99c3af2b5e770e277f6a93ac5e0d32e9
SHA2566d5ef40b36c8ae2ece6d3ee650366fe047a2b8e0452d0d32e881b78ffba0d0e4
SHA512298a7867b09f86a690a9139361c8db8f6435933a3e5f40fed843d187b16a8a0bfc26e5324f8c0e5b1b4c3be3214fdc63a3993b8c9a697cb6982040ef4fb1130f
-
Filesize
91KB
MD539c790f5c20fc5651ae3352fdb250559
SHA103b6cba98accf44e9b5a3885f7f924c44a97c078
SHA2564deca9f30e7b8e6042728a3d716e78c6c6d77777594ba711baefe54dae73922c
SHA512b8bb264ed569c097d09452823dee0b616db80f5ec07213aaef7f85a964c40670d2009ec80e8c461cdb4c288e509e3de5c09784e9535cfce1a15ee0335a31a074
-
Filesize
91KB
MD527b0d082805df80e464ea4080726289b
SHA1e4fb571cc62855c5325df088caa25fb263d33c83
SHA256a9786fef672a73d0e5dcd4f63cad47bea2f91adee625d48fd4ab74453623a998
SHA5129986a6bd518eb0caccbbb7160e9c61034927f506b65fc7b0a3f5a9e1be40cd44bead11c3c7d6a3580ec42dc407c865f884d933a69566877cb97bd236524ddb72
-
Filesize
91KB
MD5d7fa527684d2c06b6c5f529d795604d2
SHA1e78455cab521fbc4b5e3bdc51a0209cc6a232624
SHA2566c73136f73751c43fa06cadb375cc47f45f6f4a8d095d8b4702e89938ecfffcd
SHA512fe3c905a532d2a9bf367cc85fe775e37302c5e0f081d5b811b950cf683a26d128f0a58a1a294b907862aebe7618a31932a7c17b87638c4e53fbf8925bf27348f
-
Filesize
91KB
MD5cc1d645dd3cf6a794c4e1fb5bef79d94
SHA1687d5ff56ff05d46b8a66cd1e75a9eb736a1af2d
SHA25673f0f1d8fc9c6aa495add8afbd5b81c7952047ef42293062babfdbf7a3aae5cc
SHA512f01643528a057f322eec9ba54021d255fccc0138af4e72d60724dcfb9a4c9ae9aae9afc38fa0dd2cf7a0debaeacdb2a4659f3d26c93f8a17a889df4d8d1d8697
-
Filesize
91KB
MD5e7eb57cb0a9d2f1e2920e4b3fc69fae4
SHA19e554efc2b9bcdc3f0b82be460228280af9eb1bb
SHA2563faed2cdc1d37d11b7855696bed6a6b8bdf3db96f7ff212eb7bb40f392a5587e
SHA512d18cca400df29db5f9ff1f8323157441ae259fa8cb9984e386efd75327b042fb078efbf5b4af48f07f29a696898907a11dbffbe72e6be5e5ef7bd69652b668d4