Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
738919a12ecfe3b6eaae65a7d600fc9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
738919a12ecfe3b6eaae65a7d600fc9a.exe
Resource
win10v2004-20231215-en
General
-
Target
738919a12ecfe3b6eaae65a7d600fc9a.exe
-
Size
73KB
-
MD5
738919a12ecfe3b6eaae65a7d600fc9a
-
SHA1
04f8d380c2c1040429438ecd10b1fea3f3fcdb92
-
SHA256
2cf0276f8e4c2d4fcc7478eb9e4b3736928d6cf0e902a7bacacd5d4649577b82
-
SHA512
b9fa077caa7b1b198d71244cd6df5d5ec874af4f61297def58753d7fca3eb422654aec8c23684e1af94f10c5b429018f1974e705465f943026287654bb741717
-
SSDEEP
1536:k7Qx7w3JD+bXqE/LWJU0Uv+aRhdsR13l:hx7wZsxYU0Uv+ajm3l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 4532 userinit.exe 1868 system.exe 4688 system.exe 1768 system.exe 3760 system.exe 572 system.exe 3504 system.exe 2452 system.exe 4620 system.exe 3524 system.exe 2112 system.exe 2272 system.exe 2876 system.exe 892 system.exe 4104 system.exe 1056 system.exe 1788 system.exe 4424 system.exe 3308 system.exe 4152 system.exe 1996 system.exe 3384 system.exe 5056 system.exe 3024 system.exe 4824 system.exe 2308 system.exe 444 system.exe 1840 system.exe 1684 system.exe 2548 system.exe 4416 system.exe 2428 system.exe 1368 system.exe 764 system.exe 3036 system.exe 1416 system.exe 3524 system.exe 492 system.exe 3696 system.exe 1452 system.exe 1220 system.exe 2876 system.exe 4072 system.exe 3076 system.exe 3996 system.exe 4252 system.exe 3108 system.exe 4472 system.exe 1008 system.exe 3476 system.exe 1620 system.exe 1060 system.exe 3084 system.exe 4996 system.exe 1044 system.exe 3268 system.exe 1680 system.exe 4028 system.exe 3760 system.exe 1464 system.exe 2104 system.exe 2016 system.exe 1744 system.exe 3296 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 738919a12ecfe3b6eaae65a7d600fc9a.exe File opened for modification C:\Windows\userinit.exe 738919a12ecfe3b6eaae65a7d600fc9a.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 4532 userinit.exe 4532 userinit.exe 4532 userinit.exe 4532 userinit.exe 1868 system.exe 1868 system.exe 4532 userinit.exe 4532 userinit.exe 4688 system.exe 4688 system.exe 4532 userinit.exe 4532 userinit.exe 1768 system.exe 1768 system.exe 4532 userinit.exe 4532 userinit.exe 3760 system.exe 3760 system.exe 4532 userinit.exe 4532 userinit.exe 572 system.exe 572 system.exe 4532 userinit.exe 4532 userinit.exe 3504 system.exe 3504 system.exe 4532 userinit.exe 4532 userinit.exe 2452 system.exe 2452 system.exe 4532 userinit.exe 4532 userinit.exe 4620 system.exe 4620 system.exe 4532 userinit.exe 4532 userinit.exe 3524 system.exe 3524 system.exe 4532 userinit.exe 4532 userinit.exe 2112 system.exe 2112 system.exe 4532 userinit.exe 4532 userinit.exe 2272 system.exe 2272 system.exe 4532 userinit.exe 4532 userinit.exe 2876 system.exe 2876 system.exe 4532 userinit.exe 4532 userinit.exe 892 system.exe 892 system.exe 4532 userinit.exe 4532 userinit.exe 4104 system.exe 4104 system.exe 4532 userinit.exe 4532 userinit.exe 1056 system.exe 1056 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4532 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 4532 userinit.exe 4532 userinit.exe 1868 system.exe 1868 system.exe 4688 system.exe 4688 system.exe 1768 system.exe 1768 system.exe 3760 system.exe 3760 system.exe 572 system.exe 572 system.exe 3504 system.exe 3504 system.exe 2452 system.exe 2452 system.exe 4620 system.exe 4620 system.exe 3524 system.exe 3524 system.exe 2112 system.exe 2112 system.exe 2272 system.exe 2272 system.exe 2876 system.exe 2876 system.exe 892 system.exe 892 system.exe 4104 system.exe 4104 system.exe 1056 system.exe 1056 system.exe 1788 system.exe 1788 system.exe 4424 system.exe 4424 system.exe 3308 system.exe 3308 system.exe 4152 system.exe 4152 system.exe 1996 system.exe 1996 system.exe 3384 system.exe 3384 system.exe 5056 system.exe 5056 system.exe 3024 system.exe 3024 system.exe 4824 system.exe 4824 system.exe 2308 system.exe 2308 system.exe 444 system.exe 444 system.exe 1840 system.exe 1840 system.exe 1684 system.exe 1684 system.exe 2548 system.exe 2548 system.exe 4416 system.exe 4416 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 4532 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 87 PID 2836 wrote to memory of 4532 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 87 PID 2836 wrote to memory of 4532 2836 738919a12ecfe3b6eaae65a7d600fc9a.exe 87 PID 4532 wrote to memory of 1868 4532 userinit.exe 89 PID 4532 wrote to memory of 1868 4532 userinit.exe 89 PID 4532 wrote to memory of 1868 4532 userinit.exe 89 PID 4532 wrote to memory of 4688 4532 userinit.exe 91 PID 4532 wrote to memory of 4688 4532 userinit.exe 91 PID 4532 wrote to memory of 4688 4532 userinit.exe 91 PID 4532 wrote to memory of 1768 4532 userinit.exe 92 PID 4532 wrote to memory of 1768 4532 userinit.exe 92 PID 4532 wrote to memory of 1768 4532 userinit.exe 92 PID 4532 wrote to memory of 3760 4532 userinit.exe 95 PID 4532 wrote to memory of 3760 4532 userinit.exe 95 PID 4532 wrote to memory of 3760 4532 userinit.exe 95 PID 4532 wrote to memory of 572 4532 userinit.exe 98 PID 4532 wrote to memory of 572 4532 userinit.exe 98 PID 4532 wrote to memory of 572 4532 userinit.exe 98 PID 4532 wrote to memory of 3504 4532 userinit.exe 100 PID 4532 wrote to memory of 3504 4532 userinit.exe 100 PID 4532 wrote to memory of 3504 4532 userinit.exe 100 PID 4532 wrote to memory of 2452 4532 userinit.exe 101 PID 4532 wrote to memory of 2452 4532 userinit.exe 101 PID 4532 wrote to memory of 2452 4532 userinit.exe 101 PID 4532 wrote to memory of 4620 4532 userinit.exe 102 PID 4532 wrote to memory of 4620 4532 userinit.exe 102 PID 4532 wrote to memory of 4620 4532 userinit.exe 102 PID 4532 wrote to memory of 3524 4532 userinit.exe 105 PID 4532 wrote to memory of 3524 4532 userinit.exe 105 PID 4532 wrote to memory of 3524 4532 userinit.exe 105 PID 4532 wrote to memory of 2112 4532 userinit.exe 106 PID 4532 wrote to memory of 2112 4532 userinit.exe 106 PID 4532 wrote to memory of 2112 4532 userinit.exe 106 PID 4532 wrote to memory of 2272 4532 userinit.exe 107 PID 4532 wrote to memory of 2272 4532 userinit.exe 107 PID 4532 wrote to memory of 2272 4532 userinit.exe 107 PID 4532 wrote to memory of 2876 4532 userinit.exe 108 PID 4532 wrote to memory of 2876 4532 userinit.exe 108 PID 4532 wrote to memory of 2876 4532 userinit.exe 108 PID 4532 wrote to memory of 892 4532 userinit.exe 109 PID 4532 wrote to memory of 892 4532 userinit.exe 109 PID 4532 wrote to memory of 892 4532 userinit.exe 109 PID 4532 wrote to memory of 4104 4532 userinit.exe 110 PID 4532 wrote to memory of 4104 4532 userinit.exe 110 PID 4532 wrote to memory of 4104 4532 userinit.exe 110 PID 4532 wrote to memory of 1056 4532 userinit.exe 111 PID 4532 wrote to memory of 1056 4532 userinit.exe 111 PID 4532 wrote to memory of 1056 4532 userinit.exe 111 PID 4532 wrote to memory of 1788 4532 userinit.exe 112 PID 4532 wrote to memory of 1788 4532 userinit.exe 112 PID 4532 wrote to memory of 1788 4532 userinit.exe 112 PID 4532 wrote to memory of 4424 4532 userinit.exe 113 PID 4532 wrote to memory of 4424 4532 userinit.exe 113 PID 4532 wrote to memory of 4424 4532 userinit.exe 113 PID 4532 wrote to memory of 3308 4532 userinit.exe 114 PID 4532 wrote to memory of 3308 4532 userinit.exe 114 PID 4532 wrote to memory of 3308 4532 userinit.exe 114 PID 4532 wrote to memory of 4152 4532 userinit.exe 115 PID 4532 wrote to memory of 4152 4532 userinit.exe 115 PID 4532 wrote to memory of 4152 4532 userinit.exe 115 PID 4532 wrote to memory of 1996 4532 userinit.exe 116 PID 4532 wrote to memory of 1996 4532 userinit.exe 116 PID 4532 wrote to memory of 1996 4532 userinit.exe 116 PID 4532 wrote to memory of 3384 4532 userinit.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\738919a12ecfe3b6eaae65a7d600fc9a.exe"C:\Users\Admin\AppData\Local\Temp\738919a12ecfe3b6eaae65a7d600fc9a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3760
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:572
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3504
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:892
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4424
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4824
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:444
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1368
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3696
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4252
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3108
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4472
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1008
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3476
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3084
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3268
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3760
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3296
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4168
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1844
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4280
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:728
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3248
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1440
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4440
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:496
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:64
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4512
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4944
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1740
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1332
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2532
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1600
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1184
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2880
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1368
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4612
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4980
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2468
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3696
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4092
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4420
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4640
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:208
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1252
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4900
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1156
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:236
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3404
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3232
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5738919a12ecfe3b6eaae65a7d600fc9a
SHA104f8d380c2c1040429438ecd10b1fea3f3fcdb92
SHA2562cf0276f8e4c2d4fcc7478eb9e4b3736928d6cf0e902a7bacacd5d4649577b82
SHA512b9fa077caa7b1b198d71244cd6df5d5ec874af4f61297def58753d7fca3eb422654aec8c23684e1af94f10c5b429018f1974e705465f943026287654bb741717