Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe
Resource
win10v2004-20220812-en
General
-
Target
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe
-
Size
172KB
-
MD5
912c02154770a89406d23ed4bd75e759
-
SHA1
ecfd448f752ae9d68c1e6b59fe8eb001f9b8343b
-
SHA256
0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b
-
SHA512
6557e3f315374d92de2736c48d7e465c9eb0e9678d4919dba4b8156f7acda0df7ec8fff67539c2c0c5bc3404ed2b255a6592204a774185d46af83e1cbe8f8b12
-
SSDEEP
3072:LjP8K39eB8R8oSx/mOEAFIFR7N3ims2+9AhLOG7GQiCLMt8Xq/WL8mger:LD8q9hR8oSx/mOEAFIFR7NHl++hLOG7b
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xxreuw.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 xxreuw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /S" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /w" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /G" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /K" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /t" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /e" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /A" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /T" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /b" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /C" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /W" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /m" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /J" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /M" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /h" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /D" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /c" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /y" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /Y" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /H" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /r" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /v" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /q" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /E" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /k" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /U" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /F" xxreuw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /i" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /R" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /z" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /P" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /n" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /L" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /p" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /B" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /X" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /a" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /j" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /N" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /f" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /o" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /x" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /l" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /Q" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /g" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /Z" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /u" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /I" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /d" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /V" xxreuw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xxreuw = "C:\\Users\\Admin\\xxreuw.exe /O" xxreuw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe 2200 xxreuw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4692 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 2200 xxreuw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 2200 4692 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 81 PID 4692 wrote to memory of 2200 4692 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 81 PID 4692 wrote to memory of 2200 4692 0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe 81 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80 PID 2200 wrote to memory of 4692 2200 xxreuw.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe"C:\Users\Admin\AppData\Local\Temp\0853e3768a9c5d8eacc4b15111a52e3ed7dbe6ef613e9898e8fe985cf54d8f7b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\xxreuw.exe"C:\Users\Admin\xxreuw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD53d0c40833ad5b77d69c9f0b45cd4edc3
SHA1a844c97b599f463059d2510d6e7f3f649681cd15
SHA2563876e8bd353ae12f1a96a65db66d2a5a696b5778545fa2025acd0803abc405fc
SHA512b907c17d0a2571492cb607a51b63c8b204ca9a17f9cd4a24fd11c56a832af8fd386530ab8dbc4fc83281c5d89bf0cbd66d385ebac5f24978dc0e3300912b1f74
-
Filesize
172KB
MD53d0c40833ad5b77d69c9f0b45cd4edc3
SHA1a844c97b599f463059d2510d6e7f3f649681cd15
SHA2563876e8bd353ae12f1a96a65db66d2a5a696b5778545fa2025acd0803abc405fc
SHA512b907c17d0a2571492cb607a51b63c8b204ca9a17f9cd4a24fd11c56a832af8fd386530ab8dbc4fc83281c5d89bf0cbd66d385ebac5f24978dc0e3300912b1f74