Analysis
-
max time kernel
162s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 17:09
Behavioral task
behavioral1
Sample
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe
Resource
win10v2004-20231222-en
General
-
Target
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe
-
Size
42KB
-
MD5
fb58b644c3aafb587a2a377018b07b0f
-
SHA1
9d58212ae8b2722dde38903af0c4792a79133f31
-
SHA256
5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec
-
SHA512
a4d9af4c0833fb844f9d5a8f98f5749038140678b94f39f5fcf65b49ddec692e230bd29ee96b7a95987da12fef2d93f564512d86993910fe0471e83b0674d6b8
-
SSDEEP
768:MO1oR/IVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDYMeWFqtIxroMG:M0S1FKnDtkuIm/gyxr0
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (5650) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2116 wbadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_dot.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\logo.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Bold.otf 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\PSS10R.CHM 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107446.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04235_.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_ButtonGraphic.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0157177.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Mauritius 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.INF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\+README-WARNING+.txt 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ChessMCE.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01772_.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\rtscom.dll.mui 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\gadget.xml 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\45.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_ja.jar 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_distributed.gif.[329737B7].[[email protected]].mkp 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\+README-WARNING+.txt 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00486_.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD10290_.GIF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jayapura 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_ja.jar 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\sunjce_provider.jar 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105246.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215210.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+1 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\+README-WARNING+.txt 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1AR.LEX 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-heapdump_ja.jar 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_down.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zy______.pfm 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.htm 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN02724_.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0186364.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01238_.GIF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Managua 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\+README-WARNING+.txt 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Urban.xml 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.SF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\next_rest.png 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\Minesweeper.exe.mui 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287642.JPG 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02125_.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_COL.HXT 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\meta-index 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\settings.html 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00768_.WMF 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Broken_Hill 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-api_ja.jar 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\SendDisconnect.svg 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\gadget.xml 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1928 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2448 vssvc.exe Token: SeRestorePrivilege 2448 vssvc.exe Token: SeAuditPrivilege 2448 vssvc.exe Token: SeBackupPrivilege 652 wbengine.exe Token: SeRestorePrivilege 652 wbengine.exe Token: SeSecurityPrivilege 652 wbengine.exe Token: SeIncreaseQuotaPrivilege 1712 WMIC.exe Token: SeSecurityPrivilege 1712 WMIC.exe Token: SeTakeOwnershipPrivilege 1712 WMIC.exe Token: SeLoadDriverPrivilege 1712 WMIC.exe Token: SeSystemProfilePrivilege 1712 WMIC.exe Token: SeSystemtimePrivilege 1712 WMIC.exe Token: SeProfSingleProcessPrivilege 1712 WMIC.exe Token: SeIncBasePriorityPrivilege 1712 WMIC.exe Token: SeCreatePagefilePrivilege 1712 WMIC.exe Token: SeBackupPrivilege 1712 WMIC.exe Token: SeRestorePrivilege 1712 WMIC.exe Token: SeShutdownPrivilege 1712 WMIC.exe Token: SeDebugPrivilege 1712 WMIC.exe Token: SeSystemEnvironmentPrivilege 1712 WMIC.exe Token: SeRemoteShutdownPrivilege 1712 WMIC.exe Token: SeUndockPrivilege 1712 WMIC.exe Token: SeManageVolumePrivilege 1712 WMIC.exe Token: 33 1712 WMIC.exe Token: 34 1712 WMIC.exe Token: 35 1712 WMIC.exe Token: SeIncreaseQuotaPrivilege 1712 WMIC.exe Token: SeSecurityPrivilege 1712 WMIC.exe Token: SeTakeOwnershipPrivilege 1712 WMIC.exe Token: SeLoadDriverPrivilege 1712 WMIC.exe Token: SeSystemProfilePrivilege 1712 WMIC.exe Token: SeSystemtimePrivilege 1712 WMIC.exe Token: SeProfSingleProcessPrivilege 1712 WMIC.exe Token: SeIncBasePriorityPrivilege 1712 WMIC.exe Token: SeCreatePagefilePrivilege 1712 WMIC.exe Token: SeBackupPrivilege 1712 WMIC.exe Token: SeRestorePrivilege 1712 WMIC.exe Token: SeShutdownPrivilege 1712 WMIC.exe Token: SeDebugPrivilege 1712 WMIC.exe Token: SeSystemEnvironmentPrivilege 1712 WMIC.exe Token: SeRemoteShutdownPrivilege 1712 WMIC.exe Token: SeUndockPrivilege 1712 WMIC.exe Token: SeManageVolumePrivilege 1712 WMIC.exe Token: 33 1712 WMIC.exe Token: 34 1712 WMIC.exe Token: 35 1712 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2140 2640 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe 28 PID 2640 wrote to memory of 2140 2640 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe 28 PID 2640 wrote to memory of 2140 2640 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe 28 PID 2640 wrote to memory of 2140 2640 5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe 28 PID 2140 wrote to memory of 1928 2140 cmd.exe 30 PID 2140 wrote to memory of 1928 2140 cmd.exe 30 PID 2140 wrote to memory of 1928 2140 cmd.exe 30 PID 2140 wrote to memory of 2116 2140 cmd.exe 35 PID 2140 wrote to memory of 2116 2140 cmd.exe 35 PID 2140 wrote to memory of 2116 2140 cmd.exe 35 PID 2140 wrote to memory of 1712 2140 cmd.exe 39 PID 2140 wrote to memory of 1712 2140 cmd.exe 39 PID 2140 wrote to memory of 1712 2140 cmd.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe"C:\Users\Admin\AppData\Local\Temp\5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe"C:\Users\Admin\AppData\Local\Temp\5e6c71ec5cf1c594d5a30aaf7c939f1a4d1f8c719be439c518e39b1be4d364ec.exe" n26402⤵PID:1020
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1928
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:2116
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:652
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1060
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1516
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD583196ab16f30e634fe315f9373e7499e
SHA1021eff9f305e7dcecd6bda38ea009bf69d83ea26
SHA256d57c9f0a76e50f7b8dd48c8a56024bfa30d16f0cb9a02a57279c058cd8ba32a8
SHA512a3a6ca7186dc9fbdf69aee21342b95e7a0571a53d7453201ff80d0e79963703778b45e260ae3d0773c39465a4e7d71a71196485b76249de8db9819d44be29439