Analysis
-
max time kernel
143s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-05-2021 20:12
Static task
static1
Behavioral task
behavioral1
Sample
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe
Resource
win10v20210408
General
-
Target
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe
-
Size
1.8MB
-
MD5
b9e080a7ef5d11b902d97b3a7f9b742f
-
SHA1
d96ec752a89a4024e022fdb5bc5eb187216b14c2
-
SHA256
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f
-
SHA512
c9c710478fdd3e02d9b6cd5dbfc795326ebaebfe372e15247b811072adb62dd06cf777c5878df40686f857aae2c772c19bc33affbffa20866b164a2054b9caaa
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 64 IoCs
Processes:
resource yara_rule C:\Windows\System\explorer.exe warzonerat \??\c:\windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Users\Admin\AppData\Local\Temp\Disk.sys warzonerat C:\Windows\System\explorer.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat \??\c:\windows\system\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 3856 explorer.exe 2680 explorer.exe 1348 spoolsv.exe 3220 spoolsv.exe 3080 spoolsv.exe 3912 spoolsv.exe 2712 spoolsv.exe 2276 spoolsv.exe 1820 spoolsv.exe 2124 spoolsv.exe 2864 spoolsv.exe 3920 spoolsv.exe 4092 spoolsv.exe 3992 spoolsv.exe 2280 spoolsv.exe 2252 spoolsv.exe 828 spoolsv.exe 1692 spoolsv.exe 3880 spoolsv.exe 3716 spoolsv.exe 1936 spoolsv.exe 188 spoolsv.exe 204 spoolsv.exe 1512 spoolsv.exe 220 spoolsv.exe 1724 spoolsv.exe 672 spoolsv.exe 1856 spoolsv.exe 2964 spoolsv.exe 788 spoolsv.exe 3312 spoolsv.exe 824 spoolsv.exe 2448 spoolsv.exe 1708 spoolsv.exe 432 spoolsv.exe 3984 spoolsv.exe 2196 spoolsv.exe 1032 spoolsv.exe 3772 spoolsv.exe 1476 spoolsv.exe 192 spoolsv.exe 1812 spoolsv.exe 1584 spoolsv.exe 2464 spoolsv.exe 4044 spoolsv.exe 1648 spoolsv.exe 1116 spoolsv.exe 1468 spoolsv.exe 1208 spoolsv.exe 1216 spoolsv.exe 3352 spoolsv.exe 3856 spoolsv.exe 4108 spoolsv.exe 4132 spoolsv.exe 4156 spoolsv.exe 4192 spoolsv.exe 4216 spoolsv.exe 4240 spoolsv.exe 4268 spoolsv.exe 4304 spoolsv.exe 4328 spoolsv.exe 4348 spoolsv.exe 4376 spoolsv.exe 4392 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs
-
Adds Run key to start application 2 TTPs 34 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe -
Suspicious use of SetThreadContext 54 IoCs
Processes:
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 596 set thread context of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 set thread context of 216 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe diskperf.exe PID 3856 set thread context of 2680 3856 explorer.exe explorer.exe PID 1348 set thread context of 6680 1348 spoolsv.exe spoolsv.exe PID 1348 set thread context of 6700 1348 spoolsv.exe diskperf.exe PID 3220 set thread context of 6768 3220 spoolsv.exe spoolsv.exe PID 3080 set thread context of 6836 3080 spoolsv.exe spoolsv.exe PID 3220 set thread context of 6808 3220 spoolsv.exe diskperf.exe PID 3080 set thread context of 6852 3080 spoolsv.exe diskperf.exe PID 3912 set thread context of 6936 3912 spoolsv.exe spoolsv.exe PID 3912 set thread context of 6952 3912 spoolsv.exe diskperf.exe PID 2712 set thread context of 6984 2712 spoolsv.exe spoolsv.exe PID 2276 set thread context of 7036 2276 spoolsv.exe spoolsv.exe PID 2712 set thread context of 7056 2712 spoolsv.exe diskperf.exe PID 2276 set thread context of 7076 2276 spoolsv.exe diskperf.exe PID 1820 set thread context of 7112 1820 spoolsv.exe spoolsv.exe PID 2124 set thread context of 7152 2124 spoolsv.exe spoolsv.exe PID 1820 set thread context of 1464 1820 spoolsv.exe diskperf.exe PID 2124 set thread context of 6728 2124 spoolsv.exe diskperf.exe PID 2864 set thread context of 6844 2864 spoolsv.exe spoolsv.exe PID 2864 set thread context of 656 2864 spoolsv.exe diskperf.exe PID 3920 set thread context of 3368 3920 spoolsv.exe spoolsv.exe PID 3920 set thread context of 6772 3920 spoolsv.exe diskperf.exe PID 4092 set thread context of 6792 4092 spoolsv.exe spoolsv.exe PID 4092 set thread context of 6708 4092 spoolsv.exe diskperf.exe PID 3992 set thread context of 6972 3992 spoolsv.exe spoolsv.exe PID 2280 set thread context of 2740 2280 spoolsv.exe spoolsv.exe PID 2280 set thread context of 7052 2280 spoolsv.exe diskperf.exe PID 2252 set thread context of 3192 2252 spoolsv.exe spoolsv.exe PID 2252 set thread context of 2460 2252 spoolsv.exe diskperf.exe PID 828 set thread context of 7040 828 spoolsv.exe spoolsv.exe PID 1692 set thread context of 6716 1692 spoolsv.exe spoolsv.exe PID 1692 set thread context of 6816 1692 spoolsv.exe diskperf.exe PID 3880 set thread context of 7164 3880 spoolsv.exe spoolsv.exe PID 3880 set thread context of 6904 3880 spoolsv.exe diskperf.exe PID 3716 set thread context of 2772 3716 spoolsv.exe spoolsv.exe PID 1936 set thread context of 3896 1936 spoolsv.exe spoolsv.exe PID 1936 set thread context of 6996 1936 spoolsv.exe diskperf.exe PID 188 set thread context of 7132 188 spoolsv.exe spoolsv.exe PID 204 set thread context of 1872 204 spoolsv.exe spoolsv.exe PID 204 set thread context of 2452 204 spoolsv.exe diskperf.exe PID 1512 set thread context of 1596 1512 spoolsv.exe spoolsv.exe PID 1512 set thread context of 1720 1512 spoolsv.exe diskperf.exe PID 220 set thread context of 3396 220 spoolsv.exe spoolsv.exe PID 220 set thread context of 2220 220 spoolsv.exe diskperf.exe PID 1724 set thread context of 1624 1724 spoolsv.exe spoolsv.exe PID 672 set thread context of 6684 672 spoolsv.exe spoolsv.exe PID 672 set thread context of 6976 672 spoolsv.exe diskperf.exe PID 1856 set thread context of 2228 1856 spoolsv.exe spoolsv.exe PID 2964 set thread context of 3096 2964 spoolsv.exe spoolsv.exe PID 2964 set thread context of 2692 2964 spoolsv.exe diskperf.exe PID 788 set thread context of 1768 788 spoolsv.exe spoolsv.exe PID 788 set thread context of 1756 788 spoolsv.exe diskperf.exe PID 3312 set thread context of 2340 3312 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 4 IoCs
Processes:
spoolsv.exe0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exeexplorer.exepid process 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2680 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 6680 spoolsv.exe 6680 spoolsv.exe 6768 spoolsv.exe 6836 spoolsv.exe 6836 spoolsv.exe 6768 spoolsv.exe 6936 spoolsv.exe 6936 spoolsv.exe 6984 spoolsv.exe 6984 spoolsv.exe 7036 spoolsv.exe 7036 spoolsv.exe 7112 spoolsv.exe 7152 spoolsv.exe 7112 spoolsv.exe 6844 spoolsv.exe 6844 spoolsv.exe 7152 spoolsv.exe 3368 spoolsv.exe 3368 spoolsv.exe 6792 spoolsv.exe 6792 spoolsv.exe 6972 spoolsv.exe 6972 spoolsv.exe 2740 spoolsv.exe 2740 spoolsv.exe 3192 spoolsv.exe 3192 spoolsv.exe 7040 spoolsv.exe 6716 spoolsv.exe 6716 spoolsv.exe 7040 spoolsv.exe 7164 spoolsv.exe 7164 spoolsv.exe 2772 spoolsv.exe 2772 spoolsv.exe 3896 spoolsv.exe 3896 spoolsv.exe 7132 spoolsv.exe 7132 spoolsv.exe 1872 spoolsv.exe 1872 spoolsv.exe 1596 spoolsv.exe 1596 spoolsv.exe 3396 spoolsv.exe 3396 spoolsv.exe 1624 spoolsv.exe 1624 spoolsv.exe 6684 spoolsv.exe 6684 spoolsv.exe 2228 spoolsv.exe 2228 spoolsv.exe 3096 spoolsv.exe 3096 spoolsv.exe 1768 spoolsv.exe 1768 spoolsv.exe 2340 spoolsv.exe 2340 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exeexplorer.exeexplorer.exedescription pid process target process PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 192 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe PID 596 wrote to memory of 216 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe diskperf.exe PID 596 wrote to memory of 216 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe diskperf.exe PID 596 wrote to memory of 216 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe diskperf.exe PID 596 wrote to memory of 216 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe diskperf.exe PID 596 wrote to memory of 216 596 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe diskperf.exe PID 192 wrote to memory of 3856 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe explorer.exe PID 192 wrote to memory of 3856 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe explorer.exe PID 192 wrote to memory of 3856 192 0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 2680 3856 explorer.exe explorer.exe PID 3856 wrote to memory of 788 3856 explorer.exe diskperf.exe PID 3856 wrote to memory of 788 3856 explorer.exe diskperf.exe PID 3856 wrote to memory of 788 3856 explorer.exe diskperf.exe PID 2680 wrote to memory of 1348 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 1348 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 1348 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3220 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3220 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3220 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3080 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3080 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3080 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3912 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3912 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3912 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2712 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2712 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2712 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2276 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2276 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2276 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 1820 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 1820 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 1820 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2124 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2124 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2124 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2864 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2864 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2864 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3920 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3920 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3920 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 4092 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 4092 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 4092 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3992 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3992 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 3992 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2280 2680 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe"C:\Users\Admin\AppData\Local\Temp\0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe"C:\Users\Admin\AppData\Local\Temp\0fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeMD5
b9e080a7ef5d11b902d97b3a7f9b742f
SHA1d96ec752a89a4024e022fdb5bc5eb187216b14c2
SHA2560fa8e1c5768dd04021b8853529f733128e3fc2d01825a5ed28298a164172b30f
SHA512c9c710478fdd3e02d9b6cd5dbfc795326ebaebfe372e15247b811072adb62dd06cf777c5878df40686f857aae2c772c19bc33affbffa20866b164a2054b9caaa
-
C:\Users\Admin\AppData\Local\Temp\Disk.sysMD5
aded6208a6d187c59c4d6efc5e7dd6a7
SHA14a538398590f0260ee7327868751e9fdd2e88a27
SHA2563ba10be3f1c033b2c4ef2caa5cc51508c213b85e62557e1251f06137aafd43b0
SHA5123ae3607ff3b1dcd71788fd9082682384cf68270f4cb493955e1c4e0c908bf90d645881b4a45e942ce714935680dc6812fa6cc0b484967b584c381bd6cd7b8d36
-
C:\Windows\System\explorer.exeMD5
aded6208a6d187c59c4d6efc5e7dd6a7
SHA14a538398590f0260ee7327868751e9fdd2e88a27
SHA2563ba10be3f1c033b2c4ef2caa5cc51508c213b85e62557e1251f06137aafd43b0
SHA5123ae3607ff3b1dcd71788fd9082682384cf68270f4cb493955e1c4e0c908bf90d645881b4a45e942ce714935680dc6812fa6cc0b484967b584c381bd6cd7b8d36
-
C:\Windows\System\explorer.exeMD5
aded6208a6d187c59c4d6efc5e7dd6a7
SHA14a538398590f0260ee7327868751e9fdd2e88a27
SHA2563ba10be3f1c033b2c4ef2caa5cc51508c213b85e62557e1251f06137aafd43b0
SHA5123ae3607ff3b1dcd71788fd9082682384cf68270f4cb493955e1c4e0c908bf90d645881b4a45e942ce714935680dc6812fa6cc0b484967b584c381bd6cd7b8d36
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
C:\Windows\System\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
\??\c:\windows\system\explorer.exeMD5
aded6208a6d187c59c4d6efc5e7dd6a7
SHA14a538398590f0260ee7327868751e9fdd2e88a27
SHA2563ba10be3f1c033b2c4ef2caa5cc51508c213b85e62557e1251f06137aafd43b0
SHA5123ae3607ff3b1dcd71788fd9082682384cf68270f4cb493955e1c4e0c908bf90d645881b4a45e942ce714935680dc6812fa6cc0b484967b584c381bd6cd7b8d36
-
\??\c:\windows\system\spoolsv.exeMD5
e00f41ba197bfc2a6e9395106e494e88
SHA18b225cd10c6123f5dbbbeb3aec38db882bdb688c
SHA256fbcbbcd623df84b72abcd7fbc4b6d9a2b182f16bce37fc1c3ec15457b518485a
SHA5125a20f739ba7e778840092a638a9e1859622f2719a4838604d52d95a7e21c335d76d3395c1799c0db312054ea203c263317a8be6c442b2f1a395d64d7dffac23e
-
memory/188-195-0x0000000000000000-mapping.dmp
-
memory/188-202-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/192-116-0x0000000000403670-mapping.dmp
-
memory/192-259-0x0000000000610000-0x000000000075A000-memory.dmpFilesize
1.3MB
-
memory/192-115-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/192-252-0x0000000000000000-mapping.dmp
-
memory/192-122-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/204-197-0x0000000000000000-mapping.dmp
-
memory/204-201-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/216-118-0x0000000000411000-mapping.dmp
-
memory/216-123-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/216-117-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/220-213-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/220-205-0x0000000000000000-mapping.dmp
-
memory/432-244-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/432-236-0x0000000000000000-mapping.dmp
-
memory/596-114-0x00000000005A0000-0x000000000064E000-memory.dmpFilesize
696KB
-
memory/672-209-0x0000000000000000-mapping.dmp
-
memory/672-212-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/788-223-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/788-219-0x0000000000000000-mapping.dmp
-
memory/824-226-0x0000000000000000-mapping.dmp
-
memory/824-233-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/828-182-0x0000000000000000-mapping.dmp
-
memory/828-188-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/1032-242-0x0000000000000000-mapping.dmp
-
memory/1032-245-0x0000000000540000-0x0000000000541000-memory.dmpFilesize
4KB
-
memory/1116-279-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1116-271-0x0000000000000000-mapping.dmp
-
memory/1208-278-0x0000000000600000-0x000000000074A000-memory.dmpFilesize
1.3MB
-
memory/1208-275-0x0000000000000000-mapping.dmp
-
memory/1216-281-0x0000000000000000-mapping.dmp
-
memory/1216-287-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/1348-142-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/1348-139-0x0000000000000000-mapping.dmp
-
memory/1468-273-0x0000000000000000-mapping.dmp
-
memory/1468-280-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/1476-258-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/1476-250-0x0000000000000000-mapping.dmp
-
memory/1512-211-0x0000000000650000-0x000000000079A000-memory.dmpFilesize
1.3MB
-
memory/1512-203-0x0000000000000000-mapping.dmp
-
memory/1584-260-0x0000000000000000-mapping.dmp
-
memory/1584-266-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/1648-277-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/1648-269-0x0000000000000000-mapping.dmp
-
memory/1692-184-0x0000000000000000-mapping.dmp
-
memory/1692-189-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/1708-235-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/1708-230-0x0000000000000000-mapping.dmp
-
memory/1724-207-0x0000000000000000-mapping.dmp
-
memory/1724-214-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/1812-257-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/1812-254-0x0000000000000000-mapping.dmp
-
memory/1820-156-0x0000000000000000-mapping.dmp
-
memory/1820-160-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1856-215-0x0000000000000000-mapping.dmp
-
memory/1856-221-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/1936-200-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/1936-193-0x0000000000000000-mapping.dmp
-
memory/2124-169-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/2124-161-0x0000000000000000-mapping.dmp
-
memory/2196-240-0x0000000000000000-mapping.dmp
-
memory/2196-247-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2252-180-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/2252-177-0x0000000000000000-mapping.dmp
-
memory/2276-154-0x0000000000000000-mapping.dmp
-
memory/2276-159-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/2280-175-0x0000000000000000-mapping.dmp
-
memory/2280-181-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/2448-234-0x0000000000650000-0x000000000079A000-memory.dmpFilesize
1.3MB
-
memory/2448-228-0x0000000000000000-mapping.dmp
-
memory/2464-267-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/2464-262-0x0000000000000000-mapping.dmp
-
memory/2680-131-0x0000000000403670-mapping.dmp
-
memory/2712-152-0x0000000000000000-mapping.dmp
-
memory/2712-158-0x0000000000660000-0x00000000007AA000-memory.dmpFilesize
1.3MB
-
memory/2864-163-0x0000000000000000-mapping.dmp
-
memory/2864-171-0x0000000000640000-0x000000000078A000-memory.dmpFilesize
1.3MB
-
memory/2964-222-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/2964-217-0x0000000000000000-mapping.dmp
-
memory/3080-145-0x0000000000000000-mapping.dmp
-
memory/3080-150-0x0000000000580000-0x00000000006CA000-memory.dmpFilesize
1.3MB
-
memory/3220-149-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3220-143-0x0000000000000000-mapping.dmp
-
memory/3312-232-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/3312-224-0x0000000000000000-mapping.dmp
-
memory/3352-288-0x0000000000640000-0x000000000078A000-memory.dmpFilesize
1.3MB
-
memory/3352-283-0x0000000000000000-mapping.dmp
-
memory/3716-191-0x0000000000000000-mapping.dmp
-
memory/3716-199-0x0000000000A90000-0x0000000000A91000-memory.dmpFilesize
4KB
-
memory/3772-256-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/3772-248-0x0000000000000000-mapping.dmp
-
memory/3856-289-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/3856-129-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/3856-126-0x0000000000000000-mapping.dmp
-
memory/3856-285-0x0000000000000000-mapping.dmp
-
memory/3880-186-0x0000000000000000-mapping.dmp
-
memory/3880-190-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/3912-147-0x0000000000000000-mapping.dmp
-
memory/3912-151-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/3920-165-0x0000000000000000-mapping.dmp
-
memory/3920-172-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/3984-246-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/3984-238-0x0000000000000000-mapping.dmp
-
memory/3992-173-0x0000000000000000-mapping.dmp
-
memory/3992-179-0x0000000000570000-0x00000000006BA000-memory.dmpFilesize
1.3MB
-
memory/4044-264-0x0000000000000000-mapping.dmp
-
memory/4044-268-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/4092-170-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/4092-167-0x0000000000000000-mapping.dmp
-
memory/4108-296-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/4108-290-0x0000000000000000-mapping.dmp
-
memory/4132-297-0x0000000000610000-0x000000000075A000-memory.dmpFilesize
1.3MB
-
memory/4132-292-0x0000000000000000-mapping.dmp
-
memory/4156-298-0x0000000000520000-0x00000000005CE000-memory.dmpFilesize
696KB
-
memory/4156-294-0x0000000000000000-mapping.dmp
-
memory/4192-299-0x0000000000000000-mapping.dmp
-
memory/4192-305-0x0000000000650000-0x000000000079A000-memory.dmpFilesize
1.3MB
-
memory/4216-301-0x0000000000000000-mapping.dmp
-
memory/4216-307-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/4240-309-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/4240-303-0x0000000000000000-mapping.dmp
-
memory/4268-310-0x0000000000520000-0x000000000066A000-memory.dmpFilesize
1.3MB
-
memory/4268-306-0x0000000000000000-mapping.dmp
-
memory/4304-311-0x0000000000000000-mapping.dmp
-
memory/4304-315-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/4328-313-0x0000000000000000-mapping.dmp
-
memory/4328-316-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/4348-314-0x0000000000000000-mapping.dmp