Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
5905dc411bf712fc10533d5cd28c8f91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5905dc411bf712fc10533d5cd28c8f91.exe
Resource
win10v2004-20231215-en
General
-
Target
5905dc411bf712fc10533d5cd28c8f91.exe
-
Size
80KB
-
MD5
5905dc411bf712fc10533d5cd28c8f91
-
SHA1
2ae1d5245f719a442c37e56e10e221eb2b451c48
-
SHA256
b5c42bf68946de94cb58bb9e74baa78c5e10f9b3e39545bac75f4ed0ff4fd081
-
SHA512
52f1fde1f4730caf1cba81e116360ef2585952dca433427ef6ce149adbfec4994c03843d919244263561b99d8d7ea7c8e78a1c0d33e02af1f8159ccf664d4db0
-
SSDEEP
1536:sdBwRl7XqChS8Kr8Pypmr1zvaRhdsRJp7:sdGRJfHKA6pKDajip7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 3488 userinit.exe 2808 system.exe 1872 system.exe 2444 system.exe 2084 system.exe 1044 system.exe 3208 system.exe 1476 system.exe 3484 system.exe 1556 system.exe 2132 system.exe 2352 system.exe 2416 system.exe 2420 system.exe 2808 system.exe 1612 system.exe 1548 system.exe 1316 system.exe 2152 system.exe 4132 system.exe 3416 system.exe 3968 system.exe 1228 system.exe 3576 system.exe 3628 system.exe 3876 system.exe 2116 system.exe 1984 system.exe 2148 system.exe 1316 system.exe 5104 system.exe 1668 system.exe 2784 system.exe 3648 system.exe 436 system.exe 3352 system.exe 3092 system.exe 1228 system.exe 2964 system.exe 4408 system.exe 2796 system.exe 2260 system.exe 2116 system.exe 5036 system.exe 1020 system.exe 4012 system.exe 4460 system.exe 1244 system.exe 2412 system.exe 4832 system.exe 372 system.exe 3880 system.exe 2796 system.exe 4888 system.exe 5064 system.exe 5036 system.exe 2348 system.exe 4612 system.exe 2304 system.exe 2308 system.exe 4428 system.exe 4832 system.exe 2964 system.exe 4992 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 5905dc411bf712fc10533d5cd28c8f91.exe File opened for modification C:\Windows\userinit.exe 5905dc411bf712fc10533d5cd28c8f91.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2132 5905dc411bf712fc10533d5cd28c8f91.exe 2132 5905dc411bf712fc10533d5cd28c8f91.exe 3488 userinit.exe 3488 userinit.exe 3488 userinit.exe 3488 userinit.exe 2808 system.exe 2808 system.exe 3488 userinit.exe 3488 userinit.exe 1872 system.exe 1872 system.exe 3488 userinit.exe 3488 userinit.exe 2444 system.exe 2444 system.exe 3488 userinit.exe 3488 userinit.exe 2084 system.exe 2084 system.exe 3488 userinit.exe 3488 userinit.exe 1044 system.exe 1044 system.exe 3488 userinit.exe 3488 userinit.exe 3208 system.exe 3208 system.exe 3488 userinit.exe 3488 userinit.exe 1476 system.exe 1476 system.exe 3488 userinit.exe 3488 userinit.exe 3484 system.exe 3484 system.exe 3488 userinit.exe 3488 userinit.exe 1556 system.exe 1556 system.exe 3488 userinit.exe 3488 userinit.exe 2132 system.exe 2132 system.exe 3488 userinit.exe 3488 userinit.exe 2352 system.exe 2352 system.exe 3488 userinit.exe 3488 userinit.exe 2416 system.exe 2416 system.exe 3488 userinit.exe 3488 userinit.exe 2420 system.exe 2420 system.exe 3488 userinit.exe 3488 userinit.exe 2808 system.exe 2808 system.exe 3488 userinit.exe 3488 userinit.exe 1612 system.exe 1612 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3488 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2132 5905dc411bf712fc10533d5cd28c8f91.exe 2132 5905dc411bf712fc10533d5cd28c8f91.exe 3488 userinit.exe 3488 userinit.exe 2808 system.exe 2808 system.exe 1872 system.exe 1872 system.exe 2444 system.exe 2444 system.exe 2084 system.exe 2084 system.exe 1044 system.exe 1044 system.exe 3208 system.exe 3208 system.exe 1476 system.exe 1476 system.exe 3484 system.exe 3484 system.exe 1556 system.exe 1556 system.exe 2132 system.exe 2132 system.exe 2352 system.exe 2352 system.exe 2416 system.exe 2416 system.exe 2420 system.exe 2420 system.exe 2808 system.exe 2808 system.exe 1612 system.exe 1612 system.exe 1548 system.exe 1548 system.exe 1316 system.exe 1316 system.exe 2152 system.exe 2152 system.exe 4132 system.exe 4132 system.exe 3416 system.exe 3416 system.exe 3968 system.exe 3968 system.exe 1228 system.exe 1228 system.exe 3576 system.exe 3576 system.exe 3628 system.exe 3628 system.exe 3876 system.exe 3876 system.exe 2116 system.exe 2116 system.exe 1984 system.exe 1984 system.exe 2148 system.exe 2148 system.exe 1316 system.exe 1316 system.exe 5104 system.exe 5104 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3488 2132 5905dc411bf712fc10533d5cd28c8f91.exe 90 PID 2132 wrote to memory of 3488 2132 5905dc411bf712fc10533d5cd28c8f91.exe 90 PID 2132 wrote to memory of 3488 2132 5905dc411bf712fc10533d5cd28c8f91.exe 90 PID 3488 wrote to memory of 2808 3488 userinit.exe 94 PID 3488 wrote to memory of 2808 3488 userinit.exe 94 PID 3488 wrote to memory of 2808 3488 userinit.exe 94 PID 3488 wrote to memory of 1872 3488 userinit.exe 95 PID 3488 wrote to memory of 1872 3488 userinit.exe 95 PID 3488 wrote to memory of 1872 3488 userinit.exe 95 PID 3488 wrote to memory of 2444 3488 userinit.exe 98 PID 3488 wrote to memory of 2444 3488 userinit.exe 98 PID 3488 wrote to memory of 2444 3488 userinit.exe 98 PID 3488 wrote to memory of 2084 3488 userinit.exe 101 PID 3488 wrote to memory of 2084 3488 userinit.exe 101 PID 3488 wrote to memory of 2084 3488 userinit.exe 101 PID 3488 wrote to memory of 1044 3488 userinit.exe 102 PID 3488 wrote to memory of 1044 3488 userinit.exe 102 PID 3488 wrote to memory of 1044 3488 userinit.exe 102 PID 3488 wrote to memory of 3208 3488 userinit.exe 103 PID 3488 wrote to memory of 3208 3488 userinit.exe 103 PID 3488 wrote to memory of 3208 3488 userinit.exe 103 PID 3488 wrote to memory of 1476 3488 userinit.exe 105 PID 3488 wrote to memory of 1476 3488 userinit.exe 105 PID 3488 wrote to memory of 1476 3488 userinit.exe 105 PID 3488 wrote to memory of 3484 3488 userinit.exe 106 PID 3488 wrote to memory of 3484 3488 userinit.exe 106 PID 3488 wrote to memory of 3484 3488 userinit.exe 106 PID 3488 wrote to memory of 1556 3488 userinit.exe 108 PID 3488 wrote to memory of 1556 3488 userinit.exe 108 PID 3488 wrote to memory of 1556 3488 userinit.exe 108 PID 3488 wrote to memory of 2132 3488 userinit.exe 110 PID 3488 wrote to memory of 2132 3488 userinit.exe 110 PID 3488 wrote to memory of 2132 3488 userinit.exe 110 PID 3488 wrote to memory of 2352 3488 userinit.exe 111 PID 3488 wrote to memory of 2352 3488 userinit.exe 111 PID 3488 wrote to memory of 2352 3488 userinit.exe 111 PID 3488 wrote to memory of 2416 3488 userinit.exe 112 PID 3488 wrote to memory of 2416 3488 userinit.exe 112 PID 3488 wrote to memory of 2416 3488 userinit.exe 112 PID 3488 wrote to memory of 2420 3488 userinit.exe 113 PID 3488 wrote to memory of 2420 3488 userinit.exe 113 PID 3488 wrote to memory of 2420 3488 userinit.exe 113 PID 3488 wrote to memory of 2808 3488 userinit.exe 114 PID 3488 wrote to memory of 2808 3488 userinit.exe 114 PID 3488 wrote to memory of 2808 3488 userinit.exe 114 PID 3488 wrote to memory of 1612 3488 userinit.exe 115 PID 3488 wrote to memory of 1612 3488 userinit.exe 115 PID 3488 wrote to memory of 1612 3488 userinit.exe 115 PID 3488 wrote to memory of 1548 3488 userinit.exe 116 PID 3488 wrote to memory of 1548 3488 userinit.exe 116 PID 3488 wrote to memory of 1548 3488 userinit.exe 116 PID 3488 wrote to memory of 1316 3488 userinit.exe 117 PID 3488 wrote to memory of 1316 3488 userinit.exe 117 PID 3488 wrote to memory of 1316 3488 userinit.exe 117 PID 3488 wrote to memory of 2152 3488 userinit.exe 118 PID 3488 wrote to memory of 2152 3488 userinit.exe 118 PID 3488 wrote to memory of 2152 3488 userinit.exe 118 PID 3488 wrote to memory of 4132 3488 userinit.exe 119 PID 3488 wrote to memory of 4132 3488 userinit.exe 119 PID 3488 wrote to memory of 4132 3488 userinit.exe 119 PID 3488 wrote to memory of 3416 3488 userinit.exe 120 PID 3488 wrote to memory of 3416 3488 userinit.exe 120 PID 3488 wrote to memory of 3416 3488 userinit.exe 120 PID 3488 wrote to memory of 3968 3488 userinit.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\5905dc411bf712fc10533d5cd28c8f91.exe"C:\Users\Admin\AppData\Local\Temp\5905dc411bf712fc10533d5cd28c8f91.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3208
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:436
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3092
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2964
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2260
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1244
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3880
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4888
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4612
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2304
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2964
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4992
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4600
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2344
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1972
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4848
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:384
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3008
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:436
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:704
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2388
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3008
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4556
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:208
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1768
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4248
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4584
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2864
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1380
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3892
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:872
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1244
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3944
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3880
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55905dc411bf712fc10533d5cd28c8f91
SHA12ae1d5245f719a442c37e56e10e221eb2b451c48
SHA256b5c42bf68946de94cb58bb9e74baa78c5e10f9b3e39545bac75f4ed0ff4fd081
SHA51252f1fde1f4730caf1cba81e116360ef2585952dca433427ef6ce149adbfec4994c03843d919244263561b99d8d7ea7c8e78a1c0d33e02af1f8159ccf664d4db0