Analysis
-
max time kernel
152s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 17:14
Static task
static1
Behavioral task
behavioral1
Sample
f87ceb5ddb869f6acff0808b6013c9ee.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f87ceb5ddb869f6acff0808b6013c9ee.exe
Resource
win10v20201028
General
-
Target
f87ceb5ddb869f6acff0808b6013c9ee.exe
-
Size
1.2MB
-
MD5
f87ceb5ddb869f6acff0808b6013c9ee
-
SHA1
a683f891353f32a3074920820398587acae10574
-
SHA256
383e454e500270c8d52a637e3cb9270cce15be72ddb716635652eb264d394e8d
-
SHA512
d60c3a996c4fdf5bc21adc2e01d8dfa3ed7c6de23e360afb363f4b672a40fc008b299fbbf8ce7c7600b04bd0dcab5511af0329be58cbd0c71a94495269eb5d92
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 18 IoCs
Processes:
resource yara_rule C:\Windows\System\explorer.exe warzonerat \??\c:\windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Temp\Disk.sys warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\System\explorer.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat \??\c:\windows\system\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\svchost.exe warzonerat \??\c:\windows\system\svchost.exe warzonerat -
Processes:
resource yara_rule C:\Windows\System\explorer.exe aspack_v212_v242 \??\c:\windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\Disk.sys aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 C:\Windows\System\explorer.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 \??\c:\windows\system\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 C:\Windows\System\svchost.exe aspack_v212_v242 \??\c:\windows\system\svchost.exe aspack_v212_v242 -
Executes dropped EXE 13 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exesvchost.exepid process 936 explorer.exe 2180 explorer.exe 3640 spoolsv.exe 2128 spoolsv.exe 3572 spoolsv.exe 3924 spoolsv.exe 3436 spoolsv.exe 1508 spoolsv.exe 4020 spoolsv.exe 412 spoolsv.exe 192 spoolsv.exe 2468 spoolsv.exe 3812 svchost.exe -
Modifies Installed Components in the registry 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeexplorer.exespoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" f87ceb5ddb869f6acff0808b6013c9ee.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exespoolsv.exedescription pid process target process PID 3576 set thread context of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 936 set thread context of 2180 936 explorer.exe explorer.exe PID 936 set thread context of 2600 936 explorer.exe diskperf.exe PID 3640 set thread context of 192 3640 spoolsv.exe spoolsv.exe PID 3640 set thread context of 1388 3640 spoolsv.exe diskperf.exe -
Drops file in Windows directory 4 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe f87ceb5ddb869f6acff0808b6013c9ee.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3780 2128 WerFault.exe spoolsv.exe 3536 3572 WerFault.exe spoolsv.exe 636 3924 WerFault.exe spoolsv.exe 1500 3436 WerFault.exe spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe 2180 explorer.exe 2180 explorer.exe 2180 explorer.exe 2180 explorer.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 2180 explorer.exe 2180 explorer.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 3536 WerFault.exe 2180 explorer.exe 2180 explorer.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 636 WerFault.exe 2180 explorer.exe 2180 explorer.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3780 WerFault.exe Token: SeBackupPrivilege 3780 WerFault.exe Token: SeDebugPrivilege 3780 WerFault.exe Token: SeDebugPrivilege 3536 WerFault.exe Token: SeDebugPrivilege 636 WerFault.exe Token: SeDebugPrivilege 1500 WerFault.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exespoolsv.exepid process 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe 2180 explorer.exe 2180 explorer.exe 2180 explorer.exe 2180 explorer.exe 192 spoolsv.exe 192 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f87ceb5ddb869f6acff0808b6013c9ee.exef87ceb5ddb869f6acff0808b6013c9ee.exeexplorer.exeexplorer.exespoolsv.exedescription pid process target process PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 2900 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe f87ceb5ddb869f6acff0808b6013c9ee.exe PID 3576 wrote to memory of 1760 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 3576 wrote to memory of 1760 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 3576 wrote to memory of 1760 3576 f87ceb5ddb869f6acff0808b6013c9ee.exe diskperf.exe PID 2900 wrote to memory of 936 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 2900 wrote to memory of 936 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 2900 wrote to memory of 936 2900 f87ceb5ddb869f6acff0808b6013c9ee.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2180 936 explorer.exe explorer.exe PID 936 wrote to memory of 2600 936 explorer.exe diskperf.exe PID 936 wrote to memory of 2600 936 explorer.exe diskperf.exe PID 936 wrote to memory of 2600 936 explorer.exe diskperf.exe PID 936 wrote to memory of 2600 936 explorer.exe diskperf.exe PID 936 wrote to memory of 2600 936 explorer.exe diskperf.exe PID 2180 wrote to memory of 3640 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3640 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3640 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 2128 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 2128 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 2128 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3572 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3572 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3572 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3924 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3924 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3924 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3436 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3436 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 3436 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 1508 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 1508 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 1508 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 4020 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 4020 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 4020 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 412 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 412 2180 explorer.exe spoolsv.exe PID 2180 wrote to memory of 412 2180 explorer.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 192 3640 spoolsv.exe spoolsv.exe PID 3640 wrote to memory of 1388 3640 spoolsv.exe diskperf.exe PID 3640 wrote to memory of 1388 3640 spoolsv.exe diskperf.exe PID 3640 wrote to memory of 1388 3640 spoolsv.exe diskperf.exe PID 3640 wrote to memory of 1388 3640 spoolsv.exe diskperf.exe PID 3640 wrote to memory of 1388 3640 spoolsv.exe diskperf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"C:\Users\Admin\AppData\Local\Temp\f87ceb5ddb869f6acff0808b6013c9ee.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 2006⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 2006⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 2006⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 2006⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeMD5
f87ceb5ddb869f6acff0808b6013c9ee
SHA1a683f891353f32a3074920820398587acae10574
SHA256383e454e500270c8d52a637e3cb9270cce15be72ddb716635652eb264d394e8d
SHA512d60c3a996c4fdf5bc21adc2e01d8dfa3ed7c6de23e360afb363f4b672a40fc008b299fbbf8ce7c7600b04bd0dcab5511af0329be58cbd0c71a94495269eb5d92
-
C:\Users\Admin\AppData\Local\Temp\Disk.sysMD5
2f92a7d8f2e39ef6bb4381c87b257866
SHA196ab506324e9285bc629e25b3e716e2d24eb1b51
SHA256f60eaa825e5948db679f58a3c652147d3604ad7b3d299b4d6798b6ec4f123d22
SHA512229a9efe7ee74b8706361953225550f7b36a1ff08103727dc64356eb967e3277c466cb2ba81f5c6e808bc50206e64e07d2fb67eec242ab3ec1e1ad289c7ebbe6
-
C:\Windows\System\explorer.exeMD5
2f92a7d8f2e39ef6bb4381c87b257866
SHA196ab506324e9285bc629e25b3e716e2d24eb1b51
SHA256f60eaa825e5948db679f58a3c652147d3604ad7b3d299b4d6798b6ec4f123d22
SHA512229a9efe7ee74b8706361953225550f7b36a1ff08103727dc64356eb967e3277c466cb2ba81f5c6e808bc50206e64e07d2fb67eec242ab3ec1e1ad289c7ebbe6
-
C:\Windows\System\explorer.exeMD5
2f92a7d8f2e39ef6bb4381c87b257866
SHA196ab506324e9285bc629e25b3e716e2d24eb1b51
SHA256f60eaa825e5948db679f58a3c652147d3604ad7b3d299b4d6798b6ec4f123d22
SHA512229a9efe7ee74b8706361953225550f7b36a1ff08103727dc64356eb967e3277c466cb2ba81f5c6e808bc50206e64e07d2fb67eec242ab3ec1e1ad289c7ebbe6
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
C:\Windows\System\svchost.exeMD5
b5c1e9539aef516d914f65be66524780
SHA1edb40e8c1eb94547ca7e4c28fb8c9616109aa035
SHA256cdfd3f7a73547a302769ab466c6e10b841598ff5ad01e006ba8f420aa9f19435
SHA512620bf0972c221ff11a35d999a4e056872f3ea7df072ddc2f9bd49687618c5e16b5f3392634260fca8233e4b18d0e4b94a2fd38207d8bc833b991087166b9805e
-
\??\c:\windows\system\explorer.exeMD5
2f92a7d8f2e39ef6bb4381c87b257866
SHA196ab506324e9285bc629e25b3e716e2d24eb1b51
SHA256f60eaa825e5948db679f58a3c652147d3604ad7b3d299b4d6798b6ec4f123d22
SHA512229a9efe7ee74b8706361953225550f7b36a1ff08103727dc64356eb967e3277c466cb2ba81f5c6e808bc50206e64e07d2fb67eec242ab3ec1e1ad289c7ebbe6
-
\??\c:\windows\system\spoolsv.exeMD5
a7b4c7233f39ac09be385238c2a9d1aa
SHA1d2ffcc83728bb20d03bd670ec116f3bbb4dc7478
SHA256164c9aafafb76b0cbb0efcb719eda5497a0b30954c37d8ebb05dc227fd630b47
SHA5123bac33c149b4c5b6791733a7bcd3bee6f66cd3f9395bf2cda73d5bc5074d8ea17328bdcce22bd6599155e305133df9876af6788b7bd9db2b4f65258b816de2e4
-
\??\c:\windows\system\svchost.exeMD5
b5c1e9539aef516d914f65be66524780
SHA1edb40e8c1eb94547ca7e4c28fb8c9616109aa035
SHA256cdfd3f7a73547a302769ab466c6e10b841598ff5ad01e006ba8f420aa9f19435
SHA512620bf0972c221ff11a35d999a4e056872f3ea7df072ddc2f9bd49687618c5e16b5f3392634260fca8233e4b18d0e4b94a2fd38207d8bc833b991087166b9805e
-
memory/192-86-0x0000000000403670-mapping.dmp
-
memory/412-83-0x0000000000000000-mapping.dmp
-
memory/636-65-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/636-63-0x0000000004B50000-0x0000000004B51000-memory.dmpFilesize
4KB
-
memory/936-10-0x0000000000000000-mapping.dmp
-
memory/1388-91-0x0000000000411000-mapping.dmp
-
memory/1500-72-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/1500-70-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/1508-75-0x0000000000000000-mapping.dmp
-
memory/2128-32-0x0000000000000000-mapping.dmp
-
memory/2128-37-0x0000000000000000-mapping.dmp
-
memory/2180-186-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-192-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-40-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-238-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-237-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-235-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-60-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-59-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-234-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-39-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-232-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-231-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-229-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-67-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-66-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-228-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-225-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-30-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-226-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-31-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-74-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-73-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-28-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-29-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-77-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-78-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-223-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-220-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-219-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-82-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-81-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-216-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-217-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-93-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-94-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-213-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-14-0x0000000000403670-mapping.dmp
-
memory/2180-214-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-211-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-210-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-207-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-102-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-208-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-103-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-205-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-204-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-106-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-105-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-202-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-109-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-108-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-111-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-201-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-115-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-114-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-112-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-198-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-118-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-117-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-199-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-195-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-121-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-120-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-196-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-124-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-123-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-127-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-126-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-193-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-189-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-130-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-129-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-133-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-132-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-190-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-187-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-136-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-135-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-139-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-138-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-183-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-142-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-184-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-141-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-145-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-144-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-180-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-181-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-148-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-147-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-151-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-150-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-178-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-154-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-153-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-177-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-156-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-157-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-174-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-160-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-159-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-175-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-171-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-163-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-162-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-165-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-166-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-172-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2180-168-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2180-169-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/2468-97-0x0000000000000000-mapping.dmp
-
memory/2600-22-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2600-19-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2600-20-0x0000000000411000-mapping.dmp
-
memory/2900-2-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2900-3-0x0000000000403670-mapping.dmp
-
memory/2900-4-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2900-9-0x0000000003BF0000-0x0000000003BF1000-memory.dmpFilesize
4KB
-
memory/2900-8-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/3436-71-0x0000000000000000-mapping.dmp
-
memory/3436-68-0x0000000000000000-mapping.dmp
-
memory/3536-48-0x0000000004920000-0x0000000004921000-memory.dmpFilesize
4KB
-
memory/3536-43-0x00000000040E0000-0x00000000040E1000-memory.dmpFilesize
4KB
-
memory/3572-41-0x0000000000000000-mapping.dmp
-
memory/3572-46-0x0000000000000000-mapping.dmp
-
memory/3640-25-0x0000000000000000-mapping.dmp
-
memory/3780-34-0x0000000004A00000-0x0000000004A01000-memory.dmpFilesize
4KB
-
memory/3780-35-0x0000000004A00000-0x0000000004A01000-memory.dmpFilesize
4KB
-
memory/3780-38-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/3812-107-0x0000000000000000-mapping.dmp
-
memory/3812-143-0x0000000000000000-mapping.dmp
-
memory/3812-191-0x0000000000000000-mapping.dmp
-
memory/3812-128-0x0000000000000000-mapping.dmp
-
memory/3812-134-0x0000000000000000-mapping.dmp
-
memory/3812-194-0x0000000000000000-mapping.dmp
-
memory/3812-125-0x0000000000000000-mapping.dmp
-
memory/3812-122-0x0000000000000000-mapping.dmp
-
memory/3812-197-0x0000000000000000-mapping.dmp
-
memory/3812-119-0x0000000000000000-mapping.dmp
-
memory/3812-116-0x0000000000000000-mapping.dmp
-
memory/3812-200-0x0000000000000000-mapping.dmp
-
memory/3812-113-0x0000000000000000-mapping.dmp
-
memory/3812-203-0x0000000000000000-mapping.dmp
-
memory/3812-110-0x0000000000000000-mapping.dmp
-
memory/3812-170-0x0000000000000000-mapping.dmp
-
memory/3812-104-0x0000000000000000-mapping.dmp
-
memory/3812-206-0x0000000000000000-mapping.dmp
-
memory/3812-137-0x0000000000000000-mapping.dmp
-
memory/3812-188-0x0000000000000000-mapping.dmp
-
memory/3812-209-0x0000000000000000-mapping.dmp
-
memory/3812-99-0x0000000000000000-mapping.dmp
-
memory/3812-185-0x0000000000000000-mapping.dmp
-
memory/3812-212-0x0000000000000000-mapping.dmp
-
memory/3812-140-0x0000000000000000-mapping.dmp
-
memory/3812-131-0x0000000000000000-mapping.dmp
-
memory/3812-215-0x0000000000000000-mapping.dmp
-
memory/3812-182-0x0000000000000000-mapping.dmp
-
memory/3812-146-0x0000000000000000-mapping.dmp
-
memory/3812-218-0x0000000000000000-mapping.dmp
-
memory/3812-149-0x0000000000000000-mapping.dmp
-
memory/3812-152-0x0000000000000000-mapping.dmp
-
memory/3812-221-0x0000000000000000-mapping.dmp
-
memory/3812-239-0x0000000000000000-mapping.dmp
-
memory/3812-224-0x0000000000000000-mapping.dmp
-
memory/3812-179-0x0000000000000000-mapping.dmp
-
memory/3812-155-0x0000000000000000-mapping.dmp
-
memory/3812-227-0x0000000000000000-mapping.dmp
-
memory/3812-158-0x0000000000000000-mapping.dmp
-
memory/3812-161-0x0000000000000000-mapping.dmp
-
memory/3812-230-0x0000000000000000-mapping.dmp
-
memory/3812-167-0x0000000000000000-mapping.dmp
-
memory/3812-176-0x0000000000000000-mapping.dmp
-
memory/3812-233-0x0000000000000000-mapping.dmp
-
memory/3812-164-0x0000000000000000-mapping.dmp
-
memory/3812-173-0x0000000000000000-mapping.dmp
-
memory/3812-236-0x0000000000000000-mapping.dmp
-
memory/3924-61-0x0000000000000000-mapping.dmp
-
memory/3924-64-0x0000000000000000-mapping.dmp
-
memory/4020-79-0x0000000000000000-mapping.dmp