Analysis
-
max time kernel
151s -
max time network
31s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 17:14
Static task
static1
Behavioral task
behavioral1
Sample
f87ceb5ddb869f6acff0808b6013c9ee.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f87ceb5ddb869f6acff0808b6013c9ee.exe
Resource
win10v20201028
General
-
Target
f87ceb5ddb869f6acff0808b6013c9ee.exe
-
Size
1.2MB
-
MD5
f87ceb5ddb869f6acff0808b6013c9ee
-
SHA1
a683f891353f32a3074920820398587acae10574
-
SHA256
383e454e500270c8d52a637e3cb9270cce15be72ddb716635652eb264d394e8d
-
SHA512
d60c3a996c4fdf5bc21adc2e01d8dfa3ed7c6de23e360afb363f4b672a40fc008b299fbbf8ce7c7600b04bd0dcab5511af0329be58cbd0c71a94495269eb5d92
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 56 IoCs
Processes:
resource yara_rule \Windows\system\explorer.exe warzonerat C:\Windows\system\explorer.exe warzonerat \Windows\system\explorer.exe warzonerat \??\c:\windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Temp\Disk.sys warzonerat C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \??\c:\windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\svchost.exe warzonerat C:\Windows\system\svchost.exe warzonerat \Windows\system\svchost.exe warzonerat -
Processes:
resource yara_rule \Windows\system\explorer.exe aspack_v212_v242 C:\Windows\system\explorer.exe aspack_v212_v242 \Windows\system\explorer.exe aspack_v212_v242 \??\c:\windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\Disk.sys aspack_v212_v242 C:\Windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \??\c:\windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\system\spoolsv.exe aspack_v212_v242 \Windows\system\svchost.exe aspack_v212_v242 C:\Windows\system\svchost.exe aspack_v212_v242 \Windows\system\svchost.exe aspack_v212_v242 -
Executes dropped EXE 9 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exesvchost.exepid process 884 explorer.exe 1460 explorer.exe 1348 spoolsv.exe 1008 spoolsv.exe 1592 spoolsv.exe 876 spoolsv.exe 268 spoolsv.exe 324 spoolsv.exe 668 svchost.exe -
Modifies Installed Components in the registry 2 TTPs
-
Loads dropped DLL 43 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exespoolsv.exespoolsv.exepid process 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 1460 explorer.exe 1460 explorer.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 1460 explorer.exe 1460 explorer.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 1460 explorer.exe 1460 explorer.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 1348 spoolsv.exe 324 spoolsv.exe 324 spoolsv.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeexplorer.exespoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" f87ceb5ddb869f6acff0808b6013c9ee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exespoolsv.exedescription pid process target process PID 532 set thread context of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 set thread context of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 884 set thread context of 1460 884 explorer.exe explorer.exe PID 884 set thread context of 952 884 explorer.exe diskperf.exe PID 1348 set thread context of 324 1348 spoolsv.exe spoolsv.exe PID 1348 set thread context of 884 1348 spoolsv.exe diskperf.exe -
Drops file in Windows directory 5 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe f87ceb5ddb869f6acff0808b6013c9ee.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2044 1008 WerFault.exe spoolsv.exe 2024 1592 WerFault.exe spoolsv.exe 948 876 WerFault.exe spoolsv.exe 484 268 WerFault.exe spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe 1460 explorer.exe 1460 explorer.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 1460 explorer.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 1460 explorer.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 948 WerFault.exe 1460 explorer.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 484 WerFault.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2044 WerFault.exe Token: SeDebugPrivilege 2024 WerFault.exe Token: SeDebugPrivilege 948 WerFault.exe Token: SeDebugPrivilege 484 WerFault.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exespoolsv.exepid process 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 1460 explorer.exe 324 spoolsv.exe 324 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exef87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 1512 532 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 532 wrote to memory of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 532 wrote to memory of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 532 wrote to memory of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 532 wrote to memory of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 532 wrote to memory of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 532 wrote to memory of 920 532 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 1512 wrote to memory of 884 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 1512 wrote to memory of 884 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 1512 wrote to memory of 884 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 1512 wrote to memory of 884 1512 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 1460 884 explorer.exe explorer.exe PID 884 wrote to memory of 952 884 explorer.exe diskperf.exe PID 884 wrote to memory of 952 884 explorer.exe diskperf.exe PID 884 wrote to memory of 952 884 explorer.exe diskperf.exe PID 884 wrote to memory of 952 884 explorer.exe diskperf.exe PID 884 wrote to memory of 952 884 explorer.exe diskperf.exe PID 884 wrote to memory of 952 884 explorer.exe diskperf.exe PID 1460 wrote to memory of 1348 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1348 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1348 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1348 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1008 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1008 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1008 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1008 1460 explorer.exe spoolsv.exe PID 1008 wrote to memory of 2044 1008 spoolsv.exe WerFault.exe PID 1008 wrote to memory of 2044 1008 spoolsv.exe WerFault.exe PID 1008 wrote to memory of 2044 1008 spoolsv.exe WerFault.exe PID 1008 wrote to memory of 2044 1008 spoolsv.exe WerFault.exe PID 1460 wrote to memory of 1592 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1592 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1592 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 1592 1460 explorer.exe spoolsv.exe PID 1592 wrote to memory of 2024 1592 spoolsv.exe WerFault.exe PID 1592 wrote to memory of 2024 1592 spoolsv.exe WerFault.exe PID 1592 wrote to memory of 2024 1592 spoolsv.exe WerFault.exe PID 1592 wrote to memory of 2024 1592 spoolsv.exe WerFault.exe PID 1460 wrote to memory of 876 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 876 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 876 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 876 1460 explorer.exe spoolsv.exe PID 876 wrote to memory of 948 876 spoolsv.exe WerFault.exe PID 876 wrote to memory of 948 876 spoolsv.exe WerFault.exe PID 876 wrote to memory of 948 876 spoolsv.exe WerFault.exe PID 876 wrote to memory of 948 876 spoolsv.exe WerFault.exe PID 1460 wrote to memory of 268 1460 explorer.exe spoolsv.exe PID 1460 wrote to memory of 268 1460 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 366⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 366⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 366⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 268 -s 366⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeMD5
f87ceb5ddb869f6acff0808b6013c9ee
SHA1a683f891353f32a3074920820398587acae10574
SHA256383e454e500270c8d52a637e3cb9270cce15be72ddb716635652eb264d394e8d
SHA512d60c3a996c4fdf5bc21adc2e01d8dfa3ed7c6de23e360afb363f4b672a40fc008b299fbbf8ce7c7600b04bd0dcab5511af0329be58cbd0c71a94495269eb5d92
-
C:\Users\Admin\AppData\Local\Temp\Disk.sysMD5
675e6e07068ff2b0800956f64da6d2c2
SHA1820923f7c6ab9f0c50957777a9ec2e16ea20aba8
SHA256dadfc3f1b85128f3e4b46bcbc878d404fe5423e70832f69826fad2ed332633b1
SHA5127d742a1b278882afb1f1c2a3eca690d7c2921edf297a195c47e2f24be3d48e5a7fa870732fb05c046572cc3194e6f5975662c6bf71aec82c9e5b740a3fd65916
-
C:\Windows\system\explorer.exeMD5
675e6e07068ff2b0800956f64da6d2c2
SHA1820923f7c6ab9f0c50957777a9ec2e16ea20aba8
SHA256dadfc3f1b85128f3e4b46bcbc878d404fe5423e70832f69826fad2ed332633b1
SHA5127d742a1b278882afb1f1c2a3eca690d7c2921edf297a195c47e2f24be3d48e5a7fa870732fb05c046572cc3194e6f5975662c6bf71aec82c9e5b740a3fd65916
-
C:\Windows\system\explorer.exeMD5
675e6e07068ff2b0800956f64da6d2c2
SHA1820923f7c6ab9f0c50957777a9ec2e16ea20aba8
SHA256dadfc3f1b85128f3e4b46bcbc878d404fe5423e70832f69826fad2ed332633b1
SHA5127d742a1b278882afb1f1c2a3eca690d7c2921edf297a195c47e2f24be3d48e5a7fa870732fb05c046572cc3194e6f5975662c6bf71aec82c9e5b740a3fd65916
-
C:\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
C:\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
C:\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
C:\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
C:\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
C:\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
C:\Windows\system\svchost.exeMD5
183b3e19f99c13427964014e5bcdf822
SHA173dc49e467ee76e4f5b886177e727553719cf328
SHA2567bbeb44ad9f63594941581755aa4cdcd32ab0044900a241b0404fc3f438b0fe7
SHA51266c68712b0ab87d76450e00f5296f1a0b4f2eb8ac2dbbb8e2aba4e42832a3c34ca886fef0c47c22106ab498a3885bedd4e22b0dda83dba91637066855adb688e
-
\??\c:\windows\system\explorer.exeMD5
675e6e07068ff2b0800956f64da6d2c2
SHA1820923f7c6ab9f0c50957777a9ec2e16ea20aba8
SHA256dadfc3f1b85128f3e4b46bcbc878d404fe5423e70832f69826fad2ed332633b1
SHA5127d742a1b278882afb1f1c2a3eca690d7c2921edf297a195c47e2f24be3d48e5a7fa870732fb05c046572cc3194e6f5975662c6bf71aec82c9e5b740a3fd65916
-
\??\c:\windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\explorer.exeMD5
675e6e07068ff2b0800956f64da6d2c2
SHA1820923f7c6ab9f0c50957777a9ec2e16ea20aba8
SHA256dadfc3f1b85128f3e4b46bcbc878d404fe5423e70832f69826fad2ed332633b1
SHA5127d742a1b278882afb1f1c2a3eca690d7c2921edf297a195c47e2f24be3d48e5a7fa870732fb05c046572cc3194e6f5975662c6bf71aec82c9e5b740a3fd65916
-
\Windows\system\explorer.exeMD5
675e6e07068ff2b0800956f64da6d2c2
SHA1820923f7c6ab9f0c50957777a9ec2e16ea20aba8
SHA256dadfc3f1b85128f3e4b46bcbc878d404fe5423e70832f69826fad2ed332633b1
SHA5127d742a1b278882afb1f1c2a3eca690d7c2921edf297a195c47e2f24be3d48e5a7fa870732fb05c046572cc3194e6f5975662c6bf71aec82c9e5b740a3fd65916
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\spoolsv.exeMD5
d9f7731c48ef4261346c68c9c43d8ff8
SHA1ac1bc5b2ef86be8969ac5f44f831c303fd81f5cd
SHA2563e1b5d450f5bc653aa34c1f1b474f371e093608544d07b49ebab1769163eee4f
SHA5127a0f9d2c25a75d794680f14582f0e1cb594900e7ca5ed2dc53d4d90e87abcb88daef96c2351e2d6e6bc82ca1b4739853a928f629a2a4b541dae797c34c838740
-
\Windows\system\svchost.exeMD5
183b3e19f99c13427964014e5bcdf822
SHA173dc49e467ee76e4f5b886177e727553719cf328
SHA2567bbeb44ad9f63594941581755aa4cdcd32ab0044900a241b0404fc3f438b0fe7
SHA51266c68712b0ab87d76450e00f5296f1a0b4f2eb8ac2dbbb8e2aba4e42832a3c34ca886fef0c47c22106ab498a3885bedd4e22b0dda83dba91637066855adb688e
-
\Windows\system\svchost.exeMD5
183b3e19f99c13427964014e5bcdf822
SHA173dc49e467ee76e4f5b886177e727553719cf328
SHA2567bbeb44ad9f63594941581755aa4cdcd32ab0044900a241b0404fc3f438b0fe7
SHA51266c68712b0ab87d76450e00f5296f1a0b4f2eb8ac2dbbb8e2aba4e42832a3c34ca886fef0c47c22106ab498a3885bedd4e22b0dda83dba91637066855adb688e
-
memory/268-113-0x0000000000000000-mapping.dmp
-
memory/268-103-0x0000000000000000-mapping.dmp
-
memory/324-131-0x00000000002C0000-0x00000000002C4000-memory.dmpFilesize
16KB
-
memory/324-132-0x0000000002910000-0x0000000002914000-memory.dmpFilesize
16KB
-
memory/324-118-0x0000000000403670-mapping.dmp
-
memory/484-106-0x0000000001FE0000-0x0000000001FF1000-memory.dmpFilesize
68KB
-
memory/484-105-0x0000000000000000-mapping.dmp
-
memory/484-114-0x00000000025C0000-0x00000000025D1000-memory.dmpFilesize
68KB
-
memory/668-186-0x0000000000000000-mapping.dmp
-
memory/668-129-0x0000000000000000-mapping.dmp
-
memory/668-144-0x0000000000000000-mapping.dmp
-
memory/668-234-0x0000000000000000-mapping.dmp
-
memory/668-138-0x0000000000000000-mapping.dmp
-
memory/668-147-0x0000000000000000-mapping.dmp
-
memory/668-231-0x0000000000000000-mapping.dmp
-
memory/668-228-0x0000000000000000-mapping.dmp
-
memory/668-225-0x0000000000000000-mapping.dmp
-
memory/668-222-0x0000000000000000-mapping.dmp
-
memory/668-219-0x0000000000000000-mapping.dmp
-
memory/668-216-0x0000000000000000-mapping.dmp
-
memory/668-150-0x0000000000000000-mapping.dmp
-
memory/668-135-0x0000000000000000-mapping.dmp
-
memory/668-213-0x0000000000000000-mapping.dmp
-
memory/668-210-0x0000000000000000-mapping.dmp
-
memory/668-207-0x0000000000000000-mapping.dmp
-
memory/668-204-0x0000000000000000-mapping.dmp
-
memory/668-153-0x0000000000000000-mapping.dmp
-
memory/668-201-0x0000000000000000-mapping.dmp
-
memory/668-198-0x0000000000000000-mapping.dmp
-
memory/668-156-0x0000000000000000-mapping.dmp
-
memory/668-195-0x0000000000000000-mapping.dmp
-
memory/668-192-0x0000000000000000-mapping.dmp
-
memory/668-189-0x0000000000000000-mapping.dmp
-
memory/668-183-0x0000000000000000-mapping.dmp
-
memory/668-180-0x0000000000000000-mapping.dmp
-
memory/668-159-0x0000000000000000-mapping.dmp
-
memory/668-177-0x0000000000000000-mapping.dmp
-
memory/668-162-0x0000000000000000-mapping.dmp
-
memory/668-174-0x0000000000000000-mapping.dmp
-
memory/668-171-0x0000000000000000-mapping.dmp
-
memory/668-141-0x0000000000000000-mapping.dmp
-
memory/668-168-0x0000000000000000-mapping.dmp
-
memory/668-165-0x0000000000000000-mapping.dmp
-
memory/876-84-0x0000000000000000-mapping.dmp
-
memory/876-94-0x0000000000000000-mapping.dmp
-
memory/884-123-0x0000000000411000-mapping.dmp
-
memory/884-15-0x0000000000000000-mapping.dmp
-
memory/920-9-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/920-8-0x0000000000411000-mapping.dmp
-
memory/920-6-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/948-95-0x00000000024D0000-0x00000000024E1000-memory.dmpFilesize
68KB
-
memory/948-87-0x0000000002200000-0x0000000002211000-memory.dmpFilesize
68KB
-
memory/948-86-0x0000000000000000-mapping.dmp
-
memory/952-27-0x0000000000411000-mapping.dmp
-
memory/1008-55-0x0000000000000000-mapping.dmp
-
memory/1008-44-0x0000000000000000-mapping.dmp
-
memory/1348-34-0x0000000000000000-mapping.dmp
-
memory/1460-161-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-187-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-142-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-143-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-139-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-145-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-146-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-137-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-148-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-149-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-136-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-151-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-152-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-134-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-154-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-155-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-133-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-158-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-157-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-79-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-160-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-78-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-233-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-163-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-164-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-232-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-167-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-166-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-230-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-169-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-170-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-229-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-172-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-173-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-226-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-175-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-176-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-21-0x0000000000403670-mapping.dmp
-
memory/1460-178-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-179-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-37-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-182-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-181-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-36-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-227-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-185-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-184-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-140-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-39-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-188-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-190-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-191-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-38-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-193-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-194-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-41-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-196-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-197-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-224-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-199-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-200-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-223-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-202-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-221-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-203-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-205-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-206-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-97-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-208-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-209-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-98-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-211-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-212-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-60-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-215-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-214-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-59-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-217-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1460-218-0x00000000032E0000-0x00000000032F1000-memory.dmpFilesize
68KB
-
memory/1460-220-0x0000000002ED0000-0x0000000002EE1000-memory.dmpFilesize
68KB
-
memory/1512-17-0x0000000000290000-0x0000000000294000-memory.dmpFilesize
16KB
-
memory/1512-11-0x0000000002E90000-0x0000000002EA1000-memory.dmpFilesize
68KB
-
memory/1512-2-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1512-4-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1512-12-0x00000000032A0000-0x00000000032B1000-memory.dmpFilesize
68KB
-
memory/1512-3-0x0000000000403670-mapping.dmp
-
memory/1512-18-0x0000000002A90000-0x0000000002A94000-memory.dmpFilesize
16KB
-
memory/1592-65-0x0000000000000000-mapping.dmp
-
memory/1592-75-0x0000000000000000-mapping.dmp
-
memory/2024-68-0x0000000001EA0000-0x0000000001EB1000-memory.dmpFilesize
68KB
-
memory/2024-76-0x0000000002460000-0x0000000002471000-memory.dmpFilesize
68KB
-
memory/2024-67-0x0000000000000000-mapping.dmp
-
memory/2044-56-0x0000000002740000-0x0000000002751000-memory.dmpFilesize
68KB
-
memory/2044-46-0x0000000000000000-mapping.dmp
-
memory/2044-47-0x0000000002370000-0x0000000002381000-memory.dmpFilesize
68KB