Overview
overview
10Static
static
10[DemonArch...6d.exe
windows7-x64
10[DemonArch...87.exe
windows7-x64
10[DemonArch...4b.exe
windows7-x64
10[DemonArch...9e.exe
windows7-x64
10[DemonArch...ca.exe
windows7-x64
10[DemonArch...8c.exe
windows7-x64
10[DemonArch...1a.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...c4.exe
windows7-x64
10[DemonArch...68.exe
windows7-x64
10[DemonArch...50.exe
windows7-x64
10[DemonArch...3e.exe
windows7-x64
10[DemonArch...8b.exe
windows7-x64
10[DemonArch...f0.exe
windows7-x64
10[DemonArch...e1.exe
windows7-x64
10[DemonArch...89.exe
windows7-x64
[DemonArch...e5.exe
windows7-x64
10[DemonArch...85.exe
windows7-x64
10[DemonArch...6b.exe
windows7-x64
10[DemonArch...d0.exe
windows7-x64
10[DemonArch...1e.exe
windows7-x64
10[DemonArch...25.exe
windows7-x64
[DemonArch...31.exe
windows7-x64
9[DemonArch...5f.exe
windows7-x64
10[DemonArch...d3.exe
windows7-x64
10[DemonArch...a5.exe
windows7-x64
10[DemonArch...bb.exe
windows7-x64
3[DemonArch...25.exe
windows7-x64
10[DemonArch...49.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...ec.exe
windows7-x64
10[DemonArch...ae.exe
windows7-x64
10Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:15
Behavioral task
behavioral1
Sample
[DemonArchives]02602e9283805090b671a783870db86d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
[DemonArchives]0838231d7fbebe340c0ac71db0ef8c87.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
[DemonArchives]0ad8190f1160f00fc831fb329262724b.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
[DemonArchives]0bcfb8285b7397bcfc2ffb92a6c5ec9e.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
[DemonArchives]0dbf8f84a143e3e446242938dfd288ca.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
[DemonArchives]1443a4458c2b4af35c618a327b7c411a.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
[DemonArchives]15282a5c1d8e03a448ebc0b70e702a4c.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
[DemonArchives]156c78364b84a89c8e61f444c3c620c4.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
[DemonArchives]15ff3ff6cb29ac4c66a558d101e37068.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
[DemonArchives]18227e20a5e842198e7271ae54397150.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
[DemonArchives]1d957e984fcd6327f30f7006e2d11f3e.exe
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
[DemonArchives]1e2c3685399d381aa04ba4d70651e38b.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
[DemonArchives]291b00fb921e80b1cf7e8154693947f0.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
[DemonArchives]2b961a5aadff93e0d87b42e530d5a0e1.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
[DemonArchives]2be60b607087d60c5353062345f97789.exe
Resource
win7-20240611-en
Behavioral task
behavioral17
Sample
[DemonArchives]2e23d0d084cd18f08897dfe509bdd4e5.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
[DemonArchives]2edac22166e0d82bc1c652e331726c85.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
[DemonArchives]31c25cdf7b77267744cdc37912e48d6b.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe
Resource
win7-20240419-en
Behavioral task
behavioral21
Sample
[DemonArchives]34172ec379dab98d177ab7e31d517b1e.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
[DemonArchives]4cf4cbd1bc2ef0ddfe3530541ffdd925.exe
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
[DemonArchives]9a4605cedcda1924728fbe58d429915f.exe
Resource
win7-20240220-en
Behavioral task
behavioral25
Sample
[DemonArchives]a2113a088085d07d2d7688ab2b0914d3.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
[DemonArchives]aa18a0770ed7d03bddfb00e126fbbba5.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
[DemonArchives]ac7cf64a560bda15c281c43780b8d5bb.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
[DemonArchives]af6fb7fbf240ae2f6490766919b26325.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
[DemonArchives]b09a0cd1c32edf39308043eed7889449.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
[DemonArchives]b3c170550a1efdf268632916e95ad1ec.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
[DemonArchives]b83b3408e6ade0a5c61c5870208000ae.exe
Resource
win7-20240221-en
General
-
Target
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe
-
Size
398KB
-
MD5
3265873dd9d9c29a8b14f69efb8df4d0
-
SHA1
2c27d280d1b104deaf861a2801477719faa5dc82
-
SHA256
14d9335a629e2e50d998c7f4c5862f7dec22ac63ec183f190d243b4b20bf4838
-
SHA512
83502b9f428402c89ffc759aa7337a0779da48c4c72f1271d510cd22657e89ff5aab55b24cb226dba99cc6f7fa7b6b6ad7babbe1c7dd98072be616eaba17142d
-
SSDEEP
6144:5sLqdufVUNDanfz/LLvmpjE3EaICePt2lcx0vCuV61lhJrNGx39PIW:2FUNDabPupjbaNcx0vCSaZJsd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
Processes:
[demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1928 [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2676 icsys.icn.exe 2700 explorer.exe 2744 spoolsv.exe 2980 svchost.exe 2492 spoolsv.exe -
Loads dropped DLL 16 IoCs
Processes:
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exeWerFault.exepid process 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2700 explorer.exe 2700 explorer.exe 2744 spoolsv.exe 2744 spoolsv.exe 2980 svchost.exe 2980 svchost.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2832 1928 WerFault.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 672 schtasks.exe 2040 schtasks.exe 2804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exeicsys.icn.exeexplorer.exesvchost.exepid process 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2700 explorer.exe 2980 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe 2676 icsys.icn.exe 2676 icsys.icn.exe 2700 explorer.exe 2700 explorer.exe 2744 spoolsv.exe 2744 spoolsv.exe 2980 svchost.exe 2980 svchost.exe 2492 spoolsv.exe 2492 spoolsv.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exe[demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exedescription pid process target process PID 2396 wrote to memory of 1928 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe PID 2396 wrote to memory of 1928 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe PID 2396 wrote to memory of 1928 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe PID 2396 wrote to memory of 1928 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe PID 2396 wrote to memory of 2676 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe icsys.icn.exe PID 2396 wrote to memory of 2676 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe icsys.icn.exe PID 2396 wrote to memory of 2676 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe icsys.icn.exe PID 2396 wrote to memory of 2676 2396 [DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe icsys.icn.exe PID 2676 wrote to memory of 2700 2676 icsys.icn.exe explorer.exe PID 2676 wrote to memory of 2700 2676 icsys.icn.exe explorer.exe PID 2676 wrote to memory of 2700 2676 icsys.icn.exe explorer.exe PID 2676 wrote to memory of 2700 2676 icsys.icn.exe explorer.exe PID 2700 wrote to memory of 2744 2700 explorer.exe spoolsv.exe PID 2700 wrote to memory of 2744 2700 explorer.exe spoolsv.exe PID 2700 wrote to memory of 2744 2700 explorer.exe spoolsv.exe PID 2700 wrote to memory of 2744 2700 explorer.exe spoolsv.exe PID 2744 wrote to memory of 2980 2744 spoolsv.exe svchost.exe PID 2744 wrote to memory of 2980 2744 spoolsv.exe svchost.exe PID 2744 wrote to memory of 2980 2744 spoolsv.exe svchost.exe PID 2744 wrote to memory of 2980 2744 spoolsv.exe svchost.exe PID 2980 wrote to memory of 2492 2980 svchost.exe spoolsv.exe PID 2980 wrote to memory of 2492 2980 svchost.exe spoolsv.exe PID 2980 wrote to memory of 2492 2980 svchost.exe spoolsv.exe PID 2980 wrote to memory of 2492 2980 svchost.exe spoolsv.exe PID 2700 wrote to memory of 2984 2700 explorer.exe Explorer.exe PID 2700 wrote to memory of 2984 2700 explorer.exe Explorer.exe PID 2700 wrote to memory of 2984 2700 explorer.exe Explorer.exe PID 2700 wrote to memory of 2984 2700 explorer.exe Explorer.exe PID 2980 wrote to memory of 2804 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2804 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2804 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2804 2980 svchost.exe schtasks.exe PID 1928 wrote to memory of 2832 1928 [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe WerFault.exe PID 1928 wrote to memory of 2832 1928 [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe WerFault.exe PID 1928 wrote to memory of 2832 1928 [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe WerFault.exe PID 1928 wrote to memory of 2832 1928 [demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe WerFault.exe PID 2980 wrote to memory of 672 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 672 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 672 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 672 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2040 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2040 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2040 2980 svchost.exe schtasks.exe PID 2980 wrote to memory of 2040 2980 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe"C:\Users\Admin\AppData\Local\Temp\[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\users\admin\appdata\local\temp\[demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exec:\users\admin\appdata\local\temp\[demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 5643⤵
- Loads dropped DLL
- Program crash
PID:2832 -
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 17:18 /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2804 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 17:19 /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 17:20 /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:2040 -
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Resources\Themes\icsys.icn.exeFilesize
233KB
MD535f407bc092ea2b9516dabee797a15b9
SHA1a4ad77a7d1940cb03dd93ddae711e60da846a5e0
SHA256a902c376d991a5a51bbeb181687bc5b9a2d502e92990c0bdd034d8f21e07ec30
SHA5120b52bacf32bb6651516b947367d40494cefc3242f7e0f8c84c93a16ca0236f314c84b40bf63f1532e57380ecfa4bccaeaeadcc65852fbe4a947bafec733ef79b
-
C:\Windows\Resources\spoolsv.exeFilesize
233KB
MD548c10de492a03db49dcf35cc29381c14
SHA1953f11bb10ef9aa29e57f1eb44d1b8d1abca006a
SHA25697fb71a191bf15710159abb3f8e5c3dfa363200ffcf0959cad26283090e39545
SHA512139316fedfb60c64798f92c4aaeafb9aa50df52119b797173b05b37dc60a92d61f274b61130d95f28674bf4bb7e05a613d0b9bd04db9dd6bfd4ddddca08b0130
-
\??\c:\windows\resources\themes\explorer.exeFilesize
233KB
MD577715c87b9c0729ca52111a3d2008f51
SHA1035ada73935d537fe71949c6fa6115b80a4db3d3
SHA2561be06f191d470167a77d128e8d0b57a60f0e44e68b9377d3ddfa7aa444e11fb1
SHA5123ba2886eb1f209b8174afea8a675b5421f30525c7122c537ad8db8ce216908a0c05105a4f15ac74c96cb5843d467df591d3d0fee2b64c57c70b0c6fe5cb1c056
-
\Users\Admin\AppData\Local\Temp\[demonarchives]3265873dd9d9c29a8b14f69efb8df4d0.exeFilesize
165KB
MD5282e381f71c9f5e538f4b8fd2402a770
SHA1665fcfc8f295b84f2a1e5051f6012d31bd19b0f2
SHA2563d88742cea5a3f4c8d61fc89e3cba98fe239d945f86039a45f9fabbdb816db52
SHA512f4af710b467bbb47d738226e1cdbc32245abc5bb6107d69fc8ccd69d42500d2c08b201df47b7f9d737f8480ea863152237989efdf734f09f5ba149c30feabd5f
-
\Windows\Resources\svchost.exeFilesize
233KB
MD56f0e2f552eda3891480a13f104fa33fe
SHA1b8c98f3037cac55228896a2c5bc4043ae2ccd614
SHA256c50b88e6b944a522fbb98ecd9e0b3a6f6f3e38a2ab4c4e487d30de5b81a881fb
SHA512a2b9d8b98652dd4b864b0ac740d082659418cdae89538f39e0ad8a7eb262f66a6bc2941ec5259d59af22b7b99498438040db54bc0a7415a8a40a2bf19c7d71f6
-
memory/1928-39-0x00000000002B0000-0x00000000002DE000-memory.dmpFilesize
184KB
-
memory/1928-25-0x000000007427E000-0x000000007427F000-memory.dmpFilesize
4KB
-
memory/1928-97-0x000000007427E000-0x000000007427F000-memory.dmpFilesize
4KB
-
memory/2396-0-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/2396-91-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/2396-17-0x0000000000240000-0x0000000000275000-memory.dmpFilesize
212KB
-
memory/2492-72-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/2492-70-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/2676-90-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/2980-62-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB