Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe
Resource
win7-20240704-en
General
-
Target
64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe
-
Size
7.7MB
-
MD5
6ca08efccb785d2b8c23c54a05930356
-
SHA1
c4de56535545a5a6555af998b2b3fbb254637625
-
SHA256
64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed
-
SHA512
8da14f29989d5c99b0335be45951e4e87dccabefccae73a8e5cf13d91e6d47fcf1408b9020a965015b15175239f6d732d8cd4b6b11e07b232386827984b77b14
-
SSDEEP
196608:p9xmKlBELQL73HTSddEVnvbG3eVvMJxOf2X6QDpTrTMA:Yf03QdEc3eJMJxOf25VT3D
Malware Config
Extracted
njrat
0.7d
HacKed
147.185.221.20:49236
6a8a3b6e5450a823d542e748a454aa4c
-
reg_key
6a8a3b6e5450a823d542e748a454aa4c
-
splitter
|'|'|
Extracted
xworm
5.0
testarosa.duckdns.org:7110
5ZpeoOe6AtQfr6wU
-
Install_directory
%AppData%
-
install_file
Ondrive.exe
Extracted
umbral
https://discord.com/api/webhooks/1255561908631900262/FBfFOJC5RNZ6gSVwbGsinrWT1Tk0AcX2fxXrs9EMYvCvgKrDx5R4TOUhy9LGN7mz_JKs
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral2/files/0x00090000000234f7-55.dat family_umbral behavioral2/memory/4308-70-0x000001EC18680000-0x000001EC186C0000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234fa-62.dat family_xworm behavioral2/memory/836-84-0x00000000002D0000-0x00000000002E0000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1536 powershell.exe 1224 powershell.exe 3684 powershell.exe 1204 powershell.exe 4440 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4652 netsh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Server.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 3.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Server.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe -
Executes dropped EXE 10 IoCs
pid Process 4548 Server.exe 3984 3.exe 548 msxml6.EXE 4308 3.exe 4244 Server.exe 1792 conhost.exe 836 conhost.exe 736 server.exe 5024 Ondrive.exe 4588 Ondrive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6a8a3b6e5450a823d542e748a454aa4c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6a8a3b6e5450a823d542e748a454aa4c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 discord.com 27 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3424 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4768 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 836 conhost.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4308 3.exe 1536 powershell.exe 1536 powershell.exe 1356 powershell.exe 1356 powershell.exe 1224 powershell.exe 4288 powershell.exe 1224 powershell.exe 4288 powershell.exe 532 powershell.exe 532 powershell.exe 3684 powershell.exe 3684 powershell.exe 1204 powershell.exe 1204 powershell.exe 4440 powershell.exe 4440 powershell.exe 3700 powershell.exe 3700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe Token: SeDebugPrivilege 836 conhost.exe Token: SeDebugPrivilege 1792 conhost.exe Token: SeDebugPrivilege 4308 3.exe Token: SeIncreaseQuotaPrivilege 3600 wmic.exe Token: SeSecurityPrivilege 3600 wmic.exe Token: SeTakeOwnershipPrivilege 3600 wmic.exe Token: SeLoadDriverPrivilege 3600 wmic.exe Token: SeSystemProfilePrivilege 3600 wmic.exe Token: SeSystemtimePrivilege 3600 wmic.exe Token: SeProfSingleProcessPrivilege 3600 wmic.exe Token: SeIncBasePriorityPrivilege 3600 wmic.exe Token: SeCreatePagefilePrivilege 3600 wmic.exe Token: SeBackupPrivilege 3600 wmic.exe Token: SeRestorePrivilege 3600 wmic.exe Token: SeShutdownPrivilege 3600 wmic.exe Token: SeDebugPrivilege 3600 wmic.exe Token: SeSystemEnvironmentPrivilege 3600 wmic.exe Token: SeRemoteShutdownPrivilege 3600 wmic.exe Token: SeUndockPrivilege 3600 wmic.exe Token: SeManageVolumePrivilege 3600 wmic.exe Token: 33 3600 wmic.exe Token: 34 3600 wmic.exe Token: 35 3600 wmic.exe Token: 36 3600 wmic.exe Token: SeIncreaseQuotaPrivilege 3600 wmic.exe Token: SeSecurityPrivilege 3600 wmic.exe Token: SeTakeOwnershipPrivilege 3600 wmic.exe Token: SeLoadDriverPrivilege 3600 wmic.exe Token: SeSystemProfilePrivilege 3600 wmic.exe Token: SeSystemtimePrivilege 3600 wmic.exe Token: SeProfSingleProcessPrivilege 3600 wmic.exe Token: SeIncBasePriorityPrivilege 3600 wmic.exe Token: SeCreatePagefilePrivilege 3600 wmic.exe Token: SeBackupPrivilege 3600 wmic.exe Token: SeRestorePrivilege 3600 wmic.exe Token: SeShutdownPrivilege 3600 wmic.exe Token: SeDebugPrivilege 3600 wmic.exe Token: SeSystemEnvironmentPrivilege 3600 wmic.exe Token: SeRemoteShutdownPrivilege 3600 wmic.exe Token: SeUndockPrivilege 3600 wmic.exe Token: SeManageVolumePrivilege 3600 wmic.exe Token: 33 3600 wmic.exe Token: 34 3600 wmic.exe Token: 35 3600 wmic.exe Token: 36 3600 wmic.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 1224 powershell.exe Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 532 powershell.exe Token: SeDebugPrivilege 3684 powershell.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 4440 powershell.exe Token: SeIncreaseQuotaPrivilege 1188 wmic.exe Token: SeSecurityPrivilege 1188 wmic.exe Token: SeTakeOwnershipPrivilege 1188 wmic.exe Token: SeLoadDriverPrivilege 1188 wmic.exe Token: SeSystemProfilePrivilege 1188 wmic.exe Token: SeSystemtimePrivilege 1188 wmic.exe Token: SeProfSingleProcessPrivilege 1188 wmic.exe Token: SeIncBasePriorityPrivilege 1188 wmic.exe Token: SeCreatePagefilePrivilege 1188 wmic.exe Token: SeBackupPrivilege 1188 wmic.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4548 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe 88 PID 1900 wrote to memory of 4548 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe 88 PID 1900 wrote to memory of 3984 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe 89 PID 1900 wrote to memory of 3984 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe 89 PID 1900 wrote to memory of 548 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe 90 PID 1900 wrote to memory of 548 1900 64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe 90 PID 3984 wrote to memory of 4308 3984 3.exe 91 PID 3984 wrote to memory of 4308 3984 3.exe 91 PID 4548 wrote to memory of 4244 4548 Server.exe 92 PID 4548 wrote to memory of 4244 4548 Server.exe 92 PID 4548 wrote to memory of 4244 4548 Server.exe 92 PID 3984 wrote to memory of 1792 3984 3.exe 94 PID 3984 wrote to memory of 1792 3984 3.exe 94 PID 4548 wrote to memory of 836 4548 Server.exe 95 PID 4548 wrote to memory of 836 4548 Server.exe 95 PID 4308 wrote to memory of 3600 4308 3.exe 96 PID 4308 wrote to memory of 3600 4308 3.exe 96 PID 4308 wrote to memory of 4440 4308 3.exe 98 PID 4308 wrote to memory of 4440 4308 3.exe 98 PID 4308 wrote to memory of 1536 4308 3.exe 100 PID 4308 wrote to memory of 1536 4308 3.exe 100 PID 4308 wrote to memory of 1356 4308 3.exe 102 PID 4308 wrote to memory of 1356 4308 3.exe 102 PID 836 wrote to memory of 1224 836 conhost.exe 104 PID 836 wrote to memory of 1224 836 conhost.exe 104 PID 4308 wrote to memory of 4288 4308 3.exe 106 PID 4308 wrote to memory of 4288 4308 3.exe 106 PID 4308 wrote to memory of 532 4308 3.exe 108 PID 4308 wrote to memory of 532 4308 3.exe 108 PID 836 wrote to memory of 3684 836 conhost.exe 110 PID 836 wrote to memory of 3684 836 conhost.exe 110 PID 836 wrote to memory of 1204 836 conhost.exe 112 PID 836 wrote to memory of 1204 836 conhost.exe 112 PID 836 wrote to memory of 4440 836 conhost.exe 114 PID 836 wrote to memory of 4440 836 conhost.exe 114 PID 836 wrote to memory of 4376 836 conhost.exe 116 PID 836 wrote to memory of 4376 836 conhost.exe 116 PID 4308 wrote to memory of 1188 4308 3.exe 118 PID 4308 wrote to memory of 1188 4308 3.exe 118 PID 4244 wrote to memory of 736 4244 Server.exe 120 PID 4244 wrote to memory of 736 4244 Server.exe 120 PID 4244 wrote to memory of 736 4244 Server.exe 120 PID 4308 wrote to memory of 4148 4308 3.exe 121 PID 4308 wrote to memory of 4148 4308 3.exe 121 PID 4308 wrote to memory of 4312 4308 3.exe 123 PID 4308 wrote to memory of 4312 4308 3.exe 123 PID 4308 wrote to memory of 3700 4308 3.exe 125 PID 4308 wrote to memory of 3700 4308 3.exe 125 PID 4308 wrote to memory of 3424 4308 3.exe 127 PID 4308 wrote to memory of 3424 4308 3.exe 127 PID 4308 wrote to memory of 2044 4308 3.exe 129 PID 4308 wrote to memory of 2044 4308 3.exe 129 PID 2044 wrote to memory of 4768 2044 cmd.exe 131 PID 2044 wrote to memory of 4768 2044 cmd.exe 131 PID 736 wrote to memory of 4652 736 server.exe 132 PID 736 wrote to memory of 4652 736 server.exe 132 PID 736 wrote to memory of 4652 736 server.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4440 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe"C:\Users\Admin\AppData\Local\Temp\64787cd5380092f4842918dde01f0bfe92c133a925cdaef9f7289e6e53af4eed.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4652
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Roaming\3.exe"C:\Users\Admin\AppData\Roaming\3.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Roaming\3.exe"4⤵
- Views/modifies file attributes
PID:4440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\3.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵PID:4148
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:4312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:3424
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Roaming\3.exe" && pause4⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\PING.EXEping localhost5⤵
- Runs ping.exe
PID:4768
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\msxml6.EXE"C:\Users\Admin\AppData\Local\Temp\msxml6.EXE"2⤵
- Executes dropped EXE
PID:548
-
-
C:\Users\Admin\AppData\Roaming\Ondrive.exeC:\Users\Admin\AppData\Roaming\Ondrive.exe1⤵
- Executes dropped EXE
PID:5024
-
C:\Users\Admin\AppData\Roaming\Ondrive.exeC:\Users\Admin\AppData\Roaming\Ondrive.exe1⤵
- Executes dropped EXE
PID:4588
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
948B
MD5994d48c590292933efa0627922c9fc59
SHA1696a9fed9578a4f0f73e598f9d71a0c1f9d04090
SHA256f61c0e17ef24ce95d3d00170c5553c9b5b536d24c0d8e6e7480b3e2eb3855a02
SHA512f61d859fc00bf1009e6d72a0536fcd3d95d7f06016ed44dcdc1d91a872dad8abda02c7f409dcb9d0e5ea8c8c75b0d8683a60ea57045639402c37eca9eab77940
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
944B
MD545d55cc71ae97d2e4037edb5737e5273
SHA1b6f97bcab63117e2d6301212c0a4857942a2a1ee
SHA256838018b5caf4eccbed97a4603cc02f0c48b0f379427b2f0ab6fe017e4c0f30ed
SHA51295f3a9988236253d0c4cdc938d3e33e074c93faf2df592d44cf122c77ea60e9d4224185c91256b98152e663e165a541dc6f012253a5a6588abbf107c3618decb
-
Filesize
944B
MD504114c0529b116bf66d764ff6a5a8fe3
SHA10caeff17d1b2190f76c9bf539105f6c40c92bd14
SHA256fd7092b4e273314186bad6ce71aa4cd69450736b6ec6cc746868997ff82a7532
SHA5126a718c330824346606ef24f71cca6be0bfafc626b1d2b060b36e919ab07f3d6a345f56cace8a5a84ffbe2183976eb197842c9fd2f3e3b8c8dd307057d59d6f26
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
274KB
MD5ed59c6590b199b2ee53eec444322472b
SHA16c91f4e2489a9869ab971061fdd67a0eeb1e7007
SHA256aa4abbb1305525b1703a23521db1e817dfd39f014527c319a16a153d2d9dcb0f
SHA5127dd903995d2c673a3778c5f4f5006cdf3e177ad9093649e5e953894e49f386049ae1e58103095874f09b91d4e21d963d05f02ea9644ed67dd3054aa10b47ba97
-
Filesize
71KB
MD5f9b08bd21b40a938122b479095b7c70c
SHA1eb925e3927b83c20d8d24bdab2e587c10d6ac8cd
SHA256c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8
SHA512fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.7MB
MD58b39a0c9d351c316ae38251db3e917da
SHA171c988393af62584e93ebe721a600c1a51fa7c29
SHA256aacbefe172556a5df9e5bf52834aaa22893002edeb46533e1a85866cc7462a15
SHA512092f06c5f373a65be4f4784357596422df1bb50dcd81c0056464c70f99a0845d71e6819f01c8e7a2ca3f663ad4125588b6e48d88ec0736e7305a70bd8c59e9af
-
Filesize
227KB
MD566d7e8125484efe9585adf807f3860ec
SHA1aad54a84cc6bfcd422631bfce7b187b001ec0128
SHA2569cc7b63b2a2c95cfdd1f0f9044f6f760d8dae0d622aa07cb18ce071d9c491d4e
SHA512f0eabf14bab037689568dc6f7bb6126d1c5922e08432b650e338567c7ae2d70d1ac3420dfec0501453a0e8fece11482071434137e70d62e1136dd482a791d5d5
-
Filesize
23KB
MD532fe01ccb93b0233503d0aaaa451f7b2
SHA158e5a63142150e8fb175dbb4dedea2ce405d7db0
SHA2566988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43
SHA51276945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6
-
Filesize
37KB
MD5b37dd1a1f0507baf993471ae1b7a314c
SHA19aff9d71492ffff8d51f8e8d67f5770755899882
SHA256e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc
SHA512ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460