4c603d763a2b79e36492413ff788e1dd795bc09c67b2f4eccad5f339ebe44e89 (SHA256)
nstpeer.exe
Created at 2018-11-01 09:56:00
Notifications (2/2)
The operating system was rebooted during the analysis.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
4/5
|
Injection | Writes into the memory of another running process | - | |
|
||||
|
||||
|
||||
4/5
|
Injection | Modifies control flow of another process | - | |
|
||||
|
||||
|
||||
|
||||
3/5
|
Browser | Changes security-related browser settings | - | |
|
||||
3/5
|
Device | Monitors keyboard input | Keylogger | |
|
||||
2/5
|
Device | Sends control codes to connected devices | - | |
|
||||
1/5
|
Anti Analysis | Resolves APIs dynamically | - | |
|
||||
1/5
|
Information Stealing | Reads system data | Spyware | |
|
||||
|
||||
1/5
|
Persistence | Installs system startup script or application | - | |
|
||||
1/5
|
Process | Creates process with hidden window | - | |
|
||||
|
||||
1/5
|
Process | Creates a page with write and execute permissions | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Process | Reads from memory of another process | - | |
|
||||
1/5
|
Process | Overwrites code | - | |
|