Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/01/2025, 21:48

General

  • Target

    cfab9c98b929f36c3654de72b8e019ebec422bf3bf08ba9713b37bed1c592931N.exe

  • Size

    2.2MB

  • MD5

    ab520768221a49b47d5f350d2f05e320

  • SHA1

    f7809706e82860a26ceed1f2c10c1628e91df7e1

  • SHA256

    cfab9c98b929f36c3654de72b8e019ebec422bf3bf08ba9713b37bed1c592931

  • SHA512

    5561d8fc96ad335b4eb5529c9379a26250bf7d1a0bf77496f0641015375fd305b08f7502d64d471ea1d3b0049ef9ae56c60b8755dea6882f204281334eb0dd1c

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZv:0UzeyQMS4DqodCnoe+iitjWwwz

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 33 IoCs
  • Drops file in Windows directory 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfab9c98b929f36c3654de72b8e019ebec422bf3bf08ba9713b37bed1c592931N.exe
    "C:\Users\Admin\AppData\Local\Temp\cfab9c98b929f36c3654de72b8e019ebec422bf3bf08ba9713b37bed1c592931N.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:5044
      • C:\Users\Admin\AppData\Local\Temp\cfab9c98b929f36c3654de72b8e019ebec422bf3bf08ba9713b37bed1c592931N.exe
        "C:\Users\Admin\AppData\Local\Temp\cfab9c98b929f36c3654de72b8e019ebec422bf3bf08ba9713b37bed1c592931N.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4280
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4156
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2928
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1668
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2132
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4144
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:4080
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4356
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:544
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1272
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:432
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2484
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1984
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2336
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4696
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3784
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2352
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1728
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:5116
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4988
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1036
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3184
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2384
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1580
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4324
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4328
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4752
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1112
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3604
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1800
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3484
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:516
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4720
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:628
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4800
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3108
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:400
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:444
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1752
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:5056
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1128
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:392
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3896
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4492
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2268
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4996
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3276
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1468
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1204
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3692
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2328
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4548
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3620
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2400
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4604
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4288
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4892
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4008
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4832
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1364
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:840
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4760
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3512
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3080
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2892
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:116
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4588
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4004
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2612
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4996
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:5076
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                PID:3092
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3012
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:4608
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                  PID:4676
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                      PID:5040
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3308
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4808
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1812
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1032
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:396
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4268
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1956
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4840
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1744
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1960
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
          1⤵
            PID:3536

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Parameters.ini

            Filesize

            74B

            MD5

            6687785d6a31cdf9a5f80acb3abc459b

            SHA1

            1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

            SHA256

            3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

            SHA512

            5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

          • C:\Windows\System\explorer.exe

            Filesize

            2.2MB

            MD5

            3975ef9d110f715d9de2ee64830410ff

            SHA1

            6c13555008dece83642d1c92ef52ac46360d40c0

            SHA256

            8e7d0edcdc2c66e8cf732950797e86adebc5e58b43e84a45ff421fe299cecb4c

            SHA512

            e08749c111ac2dde0d7c49713ecf722781fe473ece99f793d8e8bec1c7038b6f4a4f3f7013723ac34325fe843d20221973f8c6e7bdad48bc4326c0426e2f86c5

          • C:\Windows\System\spoolsv.exe

            Filesize

            2.2MB

            MD5

            644f6093e236f8e7196eea4679ca5d13

            SHA1

            6da69325314e2e2f9eab414c68b74584e3b1f729

            SHA256

            146821503bdbb9d6d0517cca4b0457b45f30fdb4408630825bb614bbfd299470

            SHA512

            55b9c7284d6d7cc0c465526eac16666a24a46884108e166afc24d2fa9ad62827d05db9a1b438c05e3d3eedd7a4188084dbe72b29d7a9142e290e9e94f1bd9c91

          • memory/116-3072-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/392-2433-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/400-1619-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/432-1879-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/444-2409-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/444-2412-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/516-1490-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/544-1815-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/544-1820-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/544-1817-0x0000000000440000-0x0000000000509000-memory.dmp

            Filesize

            804KB

          • memory/628-1542-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1036-1186-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1112-1371-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1128-1722-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1272-1881-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1272-871-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1376-47-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/1376-46-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1376-0-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/1376-54-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1468-2632-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1468-2807-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1580-2133-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1668-719-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1668-1807-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1728-2062-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1752-1721-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1800-1423-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1984-1902-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1984-1898-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2132-1806-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2132-1969-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2268-1801-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2336-998-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2352-1089-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2384-1252-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2484-1900-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2484-927-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2612-3266-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2928-657-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2928-93-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3080-2856-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3080-2859-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3092-3394-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3184-2083-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3276-1814-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/3484-2241-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3604-2230-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3604-2234-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3620-2651-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3620-2654-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3692-1873-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/3896-1789-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4080-3219-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4156-88-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4156-94-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4280-50-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4280-82-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4280-49-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4324-1309-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4328-2221-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4328-2366-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4356-798-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4356-1818-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4492-2443-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4548-1893-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/4604-2737-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4604-2740-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4676-3460-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4696-2048-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4696-2203-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4720-2384-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4720-2371-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4760-2847-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4800-2600-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4800-2402-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4892-2830-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4988-2071-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4988-2075-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/4996-2529-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5056-2423-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/5116-1140-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB