Analysis
-
max time kernel
109s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 02:23
Behavioral task
behavioral1
Sample
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe
Resource
win10v2004-20240412-en
General
-
Target
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe
-
Size
1.8MB
-
MD5
57bcfe41a00e95a924ecedc5571da466
-
SHA1
c1eaaf1e21bc6684165432c4b440047fb5a37c19
-
SHA256
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3
-
SHA512
c78a6b3a6336f0190f15870b8cb178dbefd2857137e4cd2e1a7295467b16d515730407b73016a0d5bcdfe9c107eb8118b8324b8548fc3c8c55d8e527f4dc1c1b
-
SSDEEP
12288:p99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSGN/A7W2FeDSIGVH/KIDgv:r1gg4CppEI6GGfWDkCQDbGV6eH81kI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Detects executables packed with ASPack 34 IoCs
Processes:
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2132-2-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2132-14-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack C:\Windows\System\explorer.exe INDICATOR_EXE_Packed_ASPack behavioral2/memory/992-23-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/992-27-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe INDICATOR_EXE_Packed_ASPack behavioral2/memory/992-41-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack C:\Windows\System\spoolsv.exe INDICATOR_EXE_Packed_ASPack behavioral2/memory/1832-52-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2120-59-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4580-62-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4348-66-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4336-73-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2276-75-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/3788-70-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1832-69-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/3180-80-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4580-84-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/3316-85-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4348-89-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2120-79-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/3788-93-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2192-98-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2276-97-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1096-101-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/3316-104-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4316-110-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1160-109-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1264-115-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2092-114-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1388-120-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2192-119-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4464-105-0x0000000000400000-0x0000000000514000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\System\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 992 explorer.exe 2988 explorer.exe 1832 spoolsv.exe 4336 spoolsv.exe 2120 spoolsv.exe 4580 spoolsv.exe 4348 spoolsv.exe 3788 spoolsv.exe 2276 spoolsv.exe 3180 spoolsv.exe 3316 spoolsv.exe 1160 spoolsv.exe 2092 spoolsv.exe 2192 spoolsv.exe 1096 spoolsv.exe 4464 spoolsv.exe 4316 spoolsv.exe 1264 spoolsv.exe 1388 spoolsv.exe 4264 spoolsv.exe 4504 spoolsv.exe 3192 spoolsv.exe 5056 spoolsv.exe 3144 spoolsv.exe 4916 spoolsv.exe 2724 spoolsv.exe 4660 spoolsv.exe 1752 spoolsv.exe 2320 spoolsv.exe 4352 spoolsv.exe 2676 spoolsv.exe 3496 spoolsv.exe 3280 spoolsv.exe 3944 spoolsv.exe 1344 spoolsv.exe 3332 spoolsv.exe 3244 spoolsv.exe 3392 spoolsv.exe 368 spoolsv.exe 1988 spoolsv.exe 2660 spoolsv.exe 3268 spoolsv.exe 3812 spoolsv.exe 2212 spoolsv.exe 2444 spoolsv.exe 1844 spoolsv.exe 4472 spoolsv.exe 1716 spoolsv.exe 940 spoolsv.exe 404 spoolsv.exe 1828 spoolsv.exe 1332 spoolsv.exe 3088 spoolsv.exe 3008 spoolsv.exe 2040 spoolsv.exe 2596 spoolsv.exe 4076 spoolsv.exe 3460 spoolsv.exe 5072 spoolsv.exe 1400 spoolsv.exe 2548 spoolsv.exe 2688 spoolsv.exe 4332 spoolsv.exe 3064 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exeexplorer.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exeexplorer.exedescription pid process target process PID 2132 set thread context of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 set thread context of 8 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe diskperf.exe PID 992 set thread context of 2988 992 explorer.exe explorer.exe PID 992 set thread context of 3004 992 explorer.exe diskperf.exe -
Drops file in Windows directory 3 IoCs
Processes:
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exeexplorer.exepid process 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2988 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exeexplorer.exepid process 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exea1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exeexplorer.exeexplorer.exedescription pid process target process PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 2460 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe PID 2132 wrote to memory of 8 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe diskperf.exe PID 2132 wrote to memory of 8 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe diskperf.exe PID 2132 wrote to memory of 8 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe diskperf.exe PID 2132 wrote to memory of 8 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe diskperf.exe PID 2132 wrote to memory of 8 2132 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe diskperf.exe PID 2460 wrote to memory of 992 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe explorer.exe PID 2460 wrote to memory of 992 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe explorer.exe PID 2460 wrote to memory of 992 2460 a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 2988 992 explorer.exe explorer.exe PID 992 wrote to memory of 3004 992 explorer.exe diskperf.exe PID 992 wrote to memory of 3004 992 explorer.exe diskperf.exe PID 992 wrote to memory of 3004 992 explorer.exe diskperf.exe PID 992 wrote to memory of 3004 992 explorer.exe diskperf.exe PID 992 wrote to memory of 3004 992 explorer.exe diskperf.exe PID 2988 wrote to memory of 1832 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 1832 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 1832 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4336 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4336 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4336 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2120 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2120 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2120 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4580 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4580 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4580 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4348 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4348 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 4348 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3788 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3788 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3788 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2276 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2276 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2276 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3180 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3180 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3180 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3316 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3316 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 3316 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 1160 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 1160 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 1160 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2092 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2092 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2092 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2192 2988 explorer.exe spoolsv.exe PID 2988 wrote to memory of 2192 2988 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe"C:\Users\Admin\AppData\Local\Temp\a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe"C:\Users\Admin\AppData\Local\Temp\a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeFilesize
1.8MB
MD557bcfe41a00e95a924ecedc5571da466
SHA1c1eaaf1e21bc6684165432c4b440047fb5a37c19
SHA256a1065cf7baa5d762a6245ccef99496c102c6b6a5afada8f385e66d9f3c3361f3
SHA512c78a6b3a6336f0190f15870b8cb178dbefd2857137e4cd2e1a7295467b16d515730407b73016a0d5bcdfe9c107eb8118b8324b8548fc3c8c55d8e527f4dc1c1b
-
C:\Windows\System\explorer.exeFilesize
1.8MB
MD5d338e30fd2d0372c58f863512913d373
SHA11133ae8041ebcb634962afae359b6e43a5309e4a
SHA2561d957fd4d4cc5db7d06c171f97d5044cdc5caa545af3db3ee01192e67939a121
SHA512701f41ec105b9daf6be671920a18362b844fbcf4f79b12c7f58da0cd6488350ec998f7b06b3ec9ffcc8f0b096c520c2e941b8c187eef11bb00fb8d80943ec835
-
C:\Windows\System\spoolsv.exeFilesize
1.8MB
MD54e6bdff64b999c195456d1a6be8c5cbd
SHA18adcccad3e16882ff5dc1f4787d91a410766f8d0
SHA2569b11c26bcfc48ad683a8e59b4e99120c41a1dbfd87e09796082b2ba353521eea
SHA51207e225e0cc67f50c88a7940595218b278993a192a09b85084a94b6e69116f0076d2414f2c226ad5474c46f6767ffea6b829b4ef4e77316bab8ccde8b65948462
-
memory/8-12-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/8-15-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/8-8-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/992-24-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/992-23-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/992-27-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/992-28-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/992-41-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1096-102-0x0000000000B60000-0x0000000000B61000-memory.dmpFilesize
4KB
-
memory/1096-101-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1160-112-0x00000000022C0000-0x00000000022C1000-memory.dmpFilesize
4KB
-
memory/1160-109-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1160-90-0x00000000022C0000-0x00000000022C1000-memory.dmpFilesize
4KB
-
memory/1264-115-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1264-116-0x00000000005B0000-0x00000000005B1000-memory.dmpFilesize
4KB
-
memory/1388-120-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1832-53-0x0000000000660000-0x0000000000661000-memory.dmpFilesize
4KB
-
memory/1832-52-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1832-69-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1832-72-0x0000000000660000-0x0000000000661000-memory.dmpFilesize
4KB
-
memory/2092-114-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2092-94-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/2092-117-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/2120-60-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/2120-59-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2120-79-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2120-83-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/2132-14-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2132-3-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/2132-2-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2132-0-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2132-1-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/2192-98-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2192-119-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2192-99-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/2276-75-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2276-97-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/2276-77-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/2460-4-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2460-9-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2460-26-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2988-38-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2988-65-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3004-44-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3180-81-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/3180-80-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/3316-85-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/3316-86-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/3316-106-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/3316-104-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/3788-71-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/3788-93-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/3788-96-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/3788-70-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4316-110-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4316-111-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/4336-76-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/4336-73-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4336-57-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/4348-92-0x00000000007E0000-0x00000000007E1000-memory.dmpFilesize
4KB
-
memory/4348-66-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4348-67-0x00000000007E0000-0x00000000007E1000-memory.dmpFilesize
4KB
-
memory/4348-89-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4464-107-0x00000000006F0000-0x00000000006F1000-memory.dmpFilesize
4KB
-
memory/4464-105-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4580-84-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4580-62-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/4580-63-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/4580-88-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB