Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
c2fcbf70696315646a34d27ce9906d55.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2fcbf70696315646a34d27ce9906d55.exe
Resource
win10v2004-20240226-en
General
-
Target
c2fcbf70696315646a34d27ce9906d55.exe
-
Size
80KB
-
MD5
c2fcbf70696315646a34d27ce9906d55
-
SHA1
feed301fe84a4b87aa94218d25cfcf33d268db9c
-
SHA256
e3aaf570c1cd1cb809d7cce76bcbe60468c17be0d73eea8394d1436c6f7ca07d
-
SHA512
351e6d082fb5141c06ee97e9f6916d302541b5c38c81e64c2719854b4c55602abcd52783da8a6302abbc26d2b2e3030b3d7851187ab7b167add753a9dbd88653
-
SSDEEP
1536:Jdkf22gypebgdFwgXfu+xW2zRk5If4aRhdsRRkF:nkepys/+xW2zRk5IwajKkF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 4864 userinit.exe 1968 system.exe 3996 system.exe 3724 system.exe 3224 system.exe 4052 system.exe 1540 system.exe 3232 system.exe 3636 system.exe 828 system.exe 4880 system.exe 2800 system.exe 3056 system.exe 1904 system.exe 4336 system.exe 2248 system.exe 1524 system.exe 3596 system.exe 4564 system.exe 2448 system.exe 1164 system.exe 3224 system.exe 4180 system.exe 2052 system.exe 5064 system.exe 3316 system.exe 3876 system.exe 4384 system.exe 1468 system.exe 4312 system.exe 1528 system.exe 4688 system.exe 2800 system.exe 3816 system.exe 4996 system.exe 2840 system.exe 4088 system.exe 2468 system.exe 2832 system.exe 1488 system.exe 224 system.exe 1352 system.exe 2328 system.exe 552 system.exe 4796 system.exe 4308 system.exe 4028 system.exe 2852 system.exe 5004 system.exe 4696 system.exe 4184 system.exe 4388 system.exe 3876 system.exe 4220 system.exe 4800 system.exe 4312 system.exe 4108 system.exe 4348 system.exe 1996 system.exe 3608 system.exe 3620 system.exe 3912 system.exe 4316 system.exe 4808 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\userinit.exe c2fcbf70696315646a34d27ce9906d55.exe File created C:\Windows\kdcoms.dll userinit.exe File created C:\Windows\userinit.exe c2fcbf70696315646a34d27ce9906d55.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 c2fcbf70696315646a34d27ce9906d55.exe 2852 c2fcbf70696315646a34d27ce9906d55.exe 4864 userinit.exe 4864 userinit.exe 4864 userinit.exe 4864 userinit.exe 1968 system.exe 1968 system.exe 4864 userinit.exe 4864 userinit.exe 3996 system.exe 3996 system.exe 4864 userinit.exe 4864 userinit.exe 3724 system.exe 3724 system.exe 4864 userinit.exe 4864 userinit.exe 3224 system.exe 3224 system.exe 4864 userinit.exe 4864 userinit.exe 4052 system.exe 4052 system.exe 4864 userinit.exe 4864 userinit.exe 1540 system.exe 1540 system.exe 4864 userinit.exe 4864 userinit.exe 3232 system.exe 3232 system.exe 4864 userinit.exe 4864 userinit.exe 3636 system.exe 3636 system.exe 4864 userinit.exe 4864 userinit.exe 828 system.exe 828 system.exe 4864 userinit.exe 4864 userinit.exe 4880 system.exe 4880 system.exe 4864 userinit.exe 4864 userinit.exe 2800 system.exe 2800 system.exe 4864 userinit.exe 4864 userinit.exe 3056 system.exe 3056 system.exe 4864 userinit.exe 4864 userinit.exe 1904 system.exe 1904 system.exe 4864 userinit.exe 4864 userinit.exe 4336 system.exe 4336 system.exe 4864 userinit.exe 4864 userinit.exe 2248 system.exe 2248 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4864 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2852 c2fcbf70696315646a34d27ce9906d55.exe 2852 c2fcbf70696315646a34d27ce9906d55.exe 4864 userinit.exe 4864 userinit.exe 1968 system.exe 1968 system.exe 3996 system.exe 3996 system.exe 3724 system.exe 3724 system.exe 3224 system.exe 3224 system.exe 4052 system.exe 4052 system.exe 1540 system.exe 1540 system.exe 3232 system.exe 3232 system.exe 3636 system.exe 3636 system.exe 828 system.exe 828 system.exe 4880 system.exe 4880 system.exe 2800 system.exe 2800 system.exe 3056 system.exe 3056 system.exe 1904 system.exe 1904 system.exe 4336 system.exe 4336 system.exe 2248 system.exe 2248 system.exe 1524 system.exe 1524 system.exe 3596 system.exe 3596 system.exe 4564 system.exe 4564 system.exe 2448 system.exe 2448 system.exe 1164 system.exe 1164 system.exe 3224 system.exe 3224 system.exe 4180 system.exe 4180 system.exe 2052 system.exe 2052 system.exe 5064 system.exe 5064 system.exe 3316 system.exe 3316 system.exe 3876 system.exe 3876 system.exe 4384 system.exe 4384 system.exe 1468 system.exe 1468 system.exe 4312 system.exe 4312 system.exe 1528 system.exe 1528 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4864 2852 c2fcbf70696315646a34d27ce9906d55.exe 87 PID 2852 wrote to memory of 4864 2852 c2fcbf70696315646a34d27ce9906d55.exe 87 PID 2852 wrote to memory of 4864 2852 c2fcbf70696315646a34d27ce9906d55.exe 87 PID 4864 wrote to memory of 1968 4864 userinit.exe 91 PID 4864 wrote to memory of 1968 4864 userinit.exe 91 PID 4864 wrote to memory of 1968 4864 userinit.exe 91 PID 4864 wrote to memory of 3996 4864 userinit.exe 94 PID 4864 wrote to memory of 3996 4864 userinit.exe 94 PID 4864 wrote to memory of 3996 4864 userinit.exe 94 PID 4864 wrote to memory of 3724 4864 userinit.exe 97 PID 4864 wrote to memory of 3724 4864 userinit.exe 97 PID 4864 wrote to memory of 3724 4864 userinit.exe 97 PID 4864 wrote to memory of 3224 4864 userinit.exe 98 PID 4864 wrote to memory of 3224 4864 userinit.exe 98 PID 4864 wrote to memory of 3224 4864 userinit.exe 98 PID 4864 wrote to memory of 4052 4864 userinit.exe 99 PID 4864 wrote to memory of 4052 4864 userinit.exe 99 PID 4864 wrote to memory of 4052 4864 userinit.exe 99 PID 4864 wrote to memory of 1540 4864 userinit.exe 101 PID 4864 wrote to memory of 1540 4864 userinit.exe 101 PID 4864 wrote to memory of 1540 4864 userinit.exe 101 PID 4864 wrote to memory of 3232 4864 userinit.exe 102 PID 4864 wrote to memory of 3232 4864 userinit.exe 102 PID 4864 wrote to memory of 3232 4864 userinit.exe 102 PID 4864 wrote to memory of 3636 4864 userinit.exe 104 PID 4864 wrote to memory of 3636 4864 userinit.exe 104 PID 4864 wrote to memory of 3636 4864 userinit.exe 104 PID 4864 wrote to memory of 828 4864 userinit.exe 105 PID 4864 wrote to memory of 828 4864 userinit.exe 105 PID 4864 wrote to memory of 828 4864 userinit.exe 105 PID 4864 wrote to memory of 4880 4864 userinit.exe 107 PID 4864 wrote to memory of 4880 4864 userinit.exe 107 PID 4864 wrote to memory of 4880 4864 userinit.exe 107 PID 4864 wrote to memory of 2800 4864 userinit.exe 108 PID 4864 wrote to memory of 2800 4864 userinit.exe 108 PID 4864 wrote to memory of 2800 4864 userinit.exe 108 PID 4864 wrote to memory of 3056 4864 userinit.exe 109 PID 4864 wrote to memory of 3056 4864 userinit.exe 109 PID 4864 wrote to memory of 3056 4864 userinit.exe 109 PID 4864 wrote to memory of 1904 4864 userinit.exe 110 PID 4864 wrote to memory of 1904 4864 userinit.exe 110 PID 4864 wrote to memory of 1904 4864 userinit.exe 110 PID 4864 wrote to memory of 4336 4864 userinit.exe 111 PID 4864 wrote to memory of 4336 4864 userinit.exe 111 PID 4864 wrote to memory of 4336 4864 userinit.exe 111 PID 4864 wrote to memory of 2248 4864 userinit.exe 112 PID 4864 wrote to memory of 2248 4864 userinit.exe 112 PID 4864 wrote to memory of 2248 4864 userinit.exe 112 PID 4864 wrote to memory of 1524 4864 userinit.exe 114 PID 4864 wrote to memory of 1524 4864 userinit.exe 114 PID 4864 wrote to memory of 1524 4864 userinit.exe 114 PID 4864 wrote to memory of 3596 4864 userinit.exe 115 PID 4864 wrote to memory of 3596 4864 userinit.exe 115 PID 4864 wrote to memory of 3596 4864 userinit.exe 115 PID 4864 wrote to memory of 4564 4864 userinit.exe 116 PID 4864 wrote to memory of 4564 4864 userinit.exe 116 PID 4864 wrote to memory of 4564 4864 userinit.exe 116 PID 4864 wrote to memory of 2448 4864 userinit.exe 118 PID 4864 wrote to memory of 2448 4864 userinit.exe 118 PID 4864 wrote to memory of 2448 4864 userinit.exe 118 PID 4864 wrote to memory of 1164 4864 userinit.exe 119 PID 4864 wrote to memory of 1164 4864 userinit.exe 119 PID 4864 wrote to memory of 1164 4864 userinit.exe 119 PID 4864 wrote to memory of 3224 4864 userinit.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2fcbf70696315646a34d27ce9906d55.exe"C:\Users\Admin\AppData\Local\Temp\c2fcbf70696315646a34d27ce9906d55.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3724
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3232
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3636
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4880
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3596
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3316
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3816
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2840
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:552
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4696
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4184
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4388
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4312
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4108
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4348
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3608
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4316
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2248
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1108
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3896
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1100
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4260
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4980
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4884
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2684
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:972
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3816
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3720
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1848
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3896
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1148
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3628
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1272
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2840
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1348
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5aaf9d5287278d162edc957aa60c5b378
SHA16657a543e19e1bbe4142fe8e76be6c368cdaf2d3
SHA25660f15ea36049d1fd555dbd18f8eb93f74b20236356f94de39ac4a9b0a173b6af
SHA5126e08f3f5af82d00e124a550d53009a45ab0ac55172d9c12315e4b8171eed03dfae081645027ac641fd586ab21fd0f7ae9c855ecb7292f4c4e8321fd242ac83b3
-
Filesize
80KB
MD5c2fcbf70696315646a34d27ce9906d55
SHA1feed301fe84a4b87aa94218d25cfcf33d268db9c
SHA256e3aaf570c1cd1cb809d7cce76bcbe60468c17be0d73eea8394d1436c6f7ca07d
SHA512351e6d082fb5141c06ee97e9f6916d302541b5c38c81e64c2719854b4c55602abcd52783da8a6302abbc26d2b2e3030b3d7851187ab7b167add753a9dbd88653