Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 09:51
Behavioral task
behavioral1
Sample
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe
-
Size
1.8MB
-
MD5
4ff541cedb4e760d54fde92e2c07c920
-
SHA1
c2e038deffcb983afb27beb591836997dac8eaae
-
SHA256
d0404a052491cc95cfafb584f3b9f5a7da6d05c6741f10879e356f6802fe10b6
-
SHA512
66f0be96df30b694a2236d404a40f2a1d6512071df7ac2b75d1e58cfef966c8500826b4509b39c9edb28998f0ca28d3d98f93ce3eed7d1f9f700e847bdc013a0
-
SSDEEP
12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUeF:x+D9uVMpjOyerrFQDbGV6eH81kJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\System\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 112 explorer.exe 4752 explorer.exe 3008 spoolsv.exe 1140 spoolsv.exe 1316 spoolsv.exe 4492 spoolsv.exe 3020 spoolsv.exe 3632 spoolsv.exe 1408 spoolsv.exe 3184 spoolsv.exe 4924 spoolsv.exe 3876 spoolsv.exe 3548 spoolsv.exe 4028 spoolsv.exe 2748 spoolsv.exe 3804 spoolsv.exe 2980 spoolsv.exe 4312 spoolsv.exe 956 spoolsv.exe 1060 spoolsv.exe 3164 spoolsv.exe 3416 spoolsv.exe 2668 spoolsv.exe 2364 spoolsv.exe 3304 spoolsv.exe 3080 spoolsv.exe 2884 spoolsv.exe 3792 spoolsv.exe 1968 spoolsv.exe 332 spoolsv.exe 4000 spoolsv.exe 4568 spoolsv.exe 3248 spoolsv.exe 2672 spoolsv.exe 3524 spoolsv.exe 1384 spoolsv.exe 1452 spoolsv.exe 1804 spoolsv.exe 3024 spoolsv.exe 3172 spoolsv.exe 1832 spoolsv.exe 5116 spoolsv.exe 4848 spoolsv.exe 2512 spoolsv.exe 4436 spoolsv.exe 4604 spoolsv.exe 700 spoolsv.exe 1360 spoolsv.exe 2340 spoolsv.exe 1064 spoolsv.exe 3872 spoolsv.exe 4748 spoolsv.exe 4416 spoolsv.exe 2372 spoolsv.exe 528 spoolsv.exe 4420 spoolsv.exe 532 spoolsv.exe 3552 spoolsv.exe 4336 spoolsv.exe 1996 spoolsv.exe 180 spoolsv.exe 2792 spoolsv.exe 1964 spoolsv.exe 112 spoolsv.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
spoolsv.exe4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 1604 set thread context of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 set thread context of 2732 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe diskperf.exe PID 112 set thread context of 4752 112 explorer.exe explorer.exe PID 112 set thread context of 4920 112 explorer.exe diskperf.exe PID 3008 set thread context of 6248 3008 spoolsv.exe spoolsv.exe PID 1140 set thread context of 6392 1140 spoolsv.exe spoolsv.exe PID 1316 set thread context of 6400 1316 spoolsv.exe spoolsv.exe PID 1316 set thread context of 6428 1316 spoolsv.exe diskperf.exe PID 4492 set thread context of 6544 4492 spoolsv.exe spoolsv.exe PID 3020 set thread context of 6616 3020 spoolsv.exe spoolsv.exe PID 3020 set thread context of 6640 3020 spoolsv.exe diskperf.exe PID 3632 set thread context of 6708 3632 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 4 IoCs
Processes:
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exeexplorer.exepid process 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4752 explorer.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 4752 explorer.exe 6248 spoolsv.exe 6248 spoolsv.exe 6400 spoolsv.exe 6392 spoolsv.exe 6392 spoolsv.exe 6400 spoolsv.exe 6544 spoolsv.exe 6544 spoolsv.exe 6616 spoolsv.exe 6616 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exeexplorer.exeexplorer.exedescription pid process target process PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 3900 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe PID 1604 wrote to memory of 2732 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe diskperf.exe PID 1604 wrote to memory of 2732 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe diskperf.exe PID 1604 wrote to memory of 2732 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe diskperf.exe PID 1604 wrote to memory of 2732 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe diskperf.exe PID 1604 wrote to memory of 2732 1604 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe diskperf.exe PID 3900 wrote to memory of 112 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe explorer.exe PID 3900 wrote to memory of 112 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe explorer.exe PID 3900 wrote to memory of 112 3900 4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4752 112 explorer.exe explorer.exe PID 112 wrote to memory of 4920 112 explorer.exe diskperf.exe PID 112 wrote to memory of 4920 112 explorer.exe diskperf.exe PID 112 wrote to memory of 4920 112 explorer.exe diskperf.exe PID 112 wrote to memory of 4920 112 explorer.exe diskperf.exe PID 112 wrote to memory of 4920 112 explorer.exe diskperf.exe PID 4752 wrote to memory of 3008 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3008 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3008 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1140 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1140 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1140 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1316 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1316 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1316 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4492 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4492 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4492 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3020 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3020 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3020 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3632 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3632 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3632 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1408 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1408 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 1408 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3184 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3184 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3184 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4924 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4924 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4924 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3876 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3876 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3876 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3548 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3548 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 3548 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4028 4752 explorer.exe spoolsv.exe PID 4752 wrote to memory of 4028 4752 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4ff541cedb4e760d54fde92e2c07c920_NeikiAnalytics.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3008 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:6248 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6360
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6264
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1140 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:6392 -
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6412
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1316 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:6400 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6516
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6428
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4492 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:6544 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6592
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6576
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3020 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:6616 -
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6640
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3632 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6708
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6752
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6740
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1408 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6784
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6848
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6800
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3184 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6884
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6948
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6896
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4924 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6964
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6980
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3876 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:7052
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:7096
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:7080
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3548 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:7152
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6256
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:7164
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4028 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6268
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6436
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6316
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2748 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6380
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6388
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6444
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3804 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6456
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6584
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2980 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6556
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6656
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6572
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4312 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6692
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6744
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:4208
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:956 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6816
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:3968
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1060 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6856
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:2176
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6908
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3164 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6992
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:7088
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:7024
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3416 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:7120
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:892
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:7092
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2668 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6684
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6488
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2816
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2364 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:2996
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:4640
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3304 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6512
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:2428
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:3068
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3080 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:1224
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:32
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6636
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2884 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6700
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6836
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6696
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3792 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1968 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:332 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4000 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4568 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3248 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2672 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3524 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1384 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1452 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1804 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3024 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3172 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1832 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5116 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4848 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2512 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4436 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4604 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:700 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1360 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2340 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1064 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4748 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4416 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2372 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:528 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4420 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:532 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3552 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4336 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1996 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:180 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2792 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1964 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:112 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1144
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5032
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2524
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2500
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1604
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:400
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1548
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1004
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3964
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2600
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2492
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4036
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3472
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:644
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2420
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4736
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4972
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5140
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5160
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5188
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5216
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5244
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5268
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5288
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5312
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5336
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5368
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5392
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5416
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5436
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5452
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5468
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5488
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5508
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5524
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5540
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5556
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5572
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5592
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5616
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5632
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5648
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5664
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5680
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5700
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5716
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5732
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5752
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5768
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5788
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5808
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5824
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5840
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5856
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5872
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5892
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5908
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5924
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5944
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5960
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5980
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6000
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6020
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6036
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6052
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6068
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6084
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6104
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6124
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6140
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5176
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4136
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5280
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2156
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5384
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2300
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4372
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3132
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2352
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1912
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4548
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3328
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1616
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1516
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:656
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6156
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6184
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6212
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6232
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6272
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6344
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4920
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD54ff541cedb4e760d54fde92e2c07c920
SHA1c2e038deffcb983afb27beb591836997dac8eaae
SHA256d0404a052491cc95cfafb584f3b9f5a7da6d05c6741f10879e356f6802fe10b6
SHA51266f0be96df30b694a2236d404a40f2a1d6512071df7ac2b75d1e58cfef966c8500826b4509b39c9edb28998f0ca28d3d98f93ce3eed7d1f9f700e847bdc013a0
-
Filesize
1.8MB
MD518f212555803f7394a1d962f6a6e4f8d
SHA130b34e00d1a4dd2e7c28e1e3c1fe3953bde53bba
SHA256c274236ea8a5aa2a6eec7ee61848c9559e72f3f714576d2b5da4836febdf1e24
SHA512b3ad33311c0f28a5c748a47fb408fc39dbb747cd245da2b19b3b27abf14cd3b200ebae3a455cdb0cde9a2904ed0af1f6fdd7648a5f02f3e25901e71bb5b985aa
-
Filesize
1.8MB
MD5ef4abbc23d6af3051011aca6a30ba17a
SHA1e3e216473693e5dfa53cd620c8069db20f858056
SHA25619d12e41d731377d7d0a01a00aa6336e9480eb1144f93bd14c016130bd7d251c
SHA5125cf8c94274f79156281c8602ef7c8f901e422d0efb9a9b500c8ea3c0f6668e4ac30c2f01fcadc1a1cb58634e77292daefb2245a2d54b85d143d0918f2d2b6efc