Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 01:13
Behavioral task
behavioral1
Sample
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe
Resource
win10v2004-20241007-en
General
-
Target
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe
-
Size
2.3MB
-
MD5
4e69fcf73418a08fcb8b3e7e2ecb43c4
-
SHA1
a3ecd09f65ca4e7821a0b7f8596edcd679573f5b
-
SHA256
fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4
-
SHA512
a6d1a2b6363ad8a560567e6c11a48f8d1bc4cdfc36474902edf39f676440be82619aae52279121a776486d0edfe7a448f0fe9707b27ae760c1d6dd0201f6adc3
-
SSDEEP
49152:BwpUwcTZ0rUinysyVZl5LCCcG3RTXM34FIIPWYJxuQfUgtFneJ8BG5U:Bw1ctUyjTLC8puaX/neJ8BgU
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\sppsvc.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Recovery\\WindowsRE\\upfc.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Recovery\\WindowsRE\\upfc.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\", \"C:\\Users\\Admin\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\System.exe\", \"C:\\Recovery\\WindowsRE\\upfc.exe\", \"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\taskhostw.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4920 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4324 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1852 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 116 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4940 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 3324 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 3324 schtasks.exe 82 -
resource yara_rule behavioral2/memory/4944-1-0x0000000000F40000-0x0000000001192000-memory.dmp dcrat behavioral2/files/0x0007000000023cab-20.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 System.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Recovery\\WindowsRE\\upfc.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Recovery\\WindowsRE\\upfc.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Google\\Temp\\taskhostw.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Windows Mail\\RuntimeBroker.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Admin\\sppsvc.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Recovery\\WindowsRE\\System.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Recovery\\WindowsRE\\System.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Admin\\sppsvc.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Microsoft.NET\\RedistList\\StartMenuExperienceHost.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Google\\Temp\\taskhostw.exe\"" fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\taskhostw.exe fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe File created C:\Program Files (x86)\Google\Temp\ea9f0e6c9e2dcd fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe File created C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe File opened for modification C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe File created C:\Program Files (x86)\Windows Mail\9e8d7a4ca61bd9 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\55b276f4edf653 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\System\Speech\Idle.exe fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1364 schtasks.exe 3496 schtasks.exe 5044 schtasks.exe 4536 schtasks.exe 844 schtasks.exe 8 schtasks.exe 4324 schtasks.exe 1668 schtasks.exe 1140 schtasks.exe 4736 schtasks.exe 4920 schtasks.exe 4940 schtasks.exe 4936 schtasks.exe 2744 schtasks.exe 1852 schtasks.exe 1992 schtasks.exe 2116 schtasks.exe 116 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 3032 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe Token: SeDebugPrivilege 3032 System.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1600 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 101 PID 4944 wrote to memory of 1600 4944 fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe 101 PID 1600 wrote to memory of 4080 1600 cmd.exe 103 PID 1600 wrote to memory of 4080 1600 cmd.exe 103 PID 1600 wrote to memory of 3032 1600 cmd.exe 104 PID 1600 wrote to memory of 3032 1600 cmd.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe"C:\Users\Admin\AppData\Local\Temp\fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aTBQS3RKhw.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4080
-
-
C:\Recovery\WindowsRE\System.exe"C:\Recovery\WindowsRE\System.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Admin\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Temp\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\Temp\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD54e69fcf73418a08fcb8b3e7e2ecb43c4
SHA1a3ecd09f65ca4e7821a0b7f8596edcd679573f5b
SHA256fa78ac8f4c94923c7e53a3bf6936b46aff02f7746ee9518460c2d529ea2982d4
SHA512a6d1a2b6363ad8a560567e6c11a48f8d1bc4cdfc36474902edf39f676440be82619aae52279121a776486d0edfe7a448f0fe9707b27ae760c1d6dd0201f6adc3
-
Filesize
197B
MD5526a1ae235ce70783fc0d9e32d48d794
SHA106b55834e1d62e79fb0763b717a3c29dcae966dc
SHA2566fd20394854cd390dc6dd70df4a6f01464a4f67e1385c1dbc3d4b3c417f1a007
SHA5123f968462901d950bb5cef1b198b323403ede5f8178d3fa7b2eb571520feab4514545c90d812a0781e7a118f1f205d3dcfcdbb10968d2e9558b102d527e07e7c5