Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 11:07
Static task
static1
Behavioral task
behavioral1
Sample
bc4a2d6d_by_Libranalysis.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
bc4a2d6d_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
bc4a2d6d_by_Libranalysis.exe
-
Size
1.8MB
-
MD5
bc4a2d6d59a0aee1a434e93f5d59019a
-
SHA1
2403a1c0017b46d2357f3730b9d5c16fa7284a28
-
SHA256
926509aff0ec48ac354fe49b372f8e2b8d05fe97ba5a1828b422ca75b95cb0ea
-
SHA512
5b808a743ed3663656417dc23b9614dc89ab25c5814040f76afa356659ce3614431a2580963e977c9169d262ba80a4238d70ab53b7317f1b6003fd5111e8ba47
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 64 IoCs
Processes:
resource yara_rule \Windows\system\explorer.exe warzonerat \Windows\system\explorer.exe warzonerat C:\Windows\system\explorer.exe warzonerat \??\c:\windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Temp\Disk.sys warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\system\explorer.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 600 explorer.exe 668 explorer.exe 1368 spoolsv.exe 1484 spoolsv.exe 672 spoolsv.exe 788 spoolsv.exe 1756 spoolsv.exe 2020 spoolsv.exe 2040 spoolsv.exe 1560 spoolsv.exe 916 spoolsv.exe 952 spoolsv.exe 1544 spoolsv.exe 292 spoolsv.exe 340 spoolsv.exe 1676 spoolsv.exe 2036 spoolsv.exe 1816 spoolsv.exe 804 spoolsv.exe 620 spoolsv.exe 860 spoolsv.exe 284 spoolsv.exe 1688 spoolsv.exe 1160 spoolsv.exe 644 spoolsv.exe 1256 spoolsv.exe 1620 spoolsv.exe 532 spoolsv.exe 2016 spoolsv.exe 1276 spoolsv.exe 972 spoolsv.exe 960 spoolsv.exe 272 spoolsv.exe 288 spoolsv.exe 888 spoolsv.exe 556 spoolsv.exe 1864 spoolsv.exe 2008 spoolsv.exe 1564 spoolsv.exe 852 spoolsv.exe 1504 spoolsv.exe 600 spoolsv.exe 1476 spoolsv.exe 1112 spoolsv.exe 1552 spoolsv.exe 1748 spoolsv.exe 1860 spoolsv.exe 1724 spoolsv.exe 1228 spoolsv.exe 1576 spoolsv.exe 728 spoolsv.exe 1680 spoolsv.exe 1960 spoolsv.exe 1172 spoolsv.exe 1556 spoolsv.exe 756 spoolsv.exe 1300 spoolsv.exe 776 spoolsv.exe 1056 spoolsv.exe 1432 spoolsv.exe 1308 spoolsv.exe 2004 spoolsv.exe 2000 spoolsv.exe 1192 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs
-
Loads dropped DLL 64 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exeexplorer.exepid process 1636 bc4a2d6d_by_Libranalysis.exe 1636 bc4a2d6d_by_Libranalysis.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe -
Adds Run key to start application 2 TTPs 37 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" bc4a2d6d_by_Libranalysis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 1084 set thread context of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 set thread context of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 600 set thread context of 668 600 explorer.exe explorer.exe PID 600 set thread context of 328 600 explorer.exe diskperf.exe PID 1368 set thread context of 3096 1368 spoolsv.exe spoolsv.exe PID 1368 set thread context of 3104 1368 spoolsv.exe diskperf.exe PID 1484 set thread context of 3132 1484 spoolsv.exe spoolsv.exe PID 1484 set thread context of 3140 1484 spoolsv.exe diskperf.exe PID 672 set thread context of 3168 672 spoolsv.exe spoolsv.exe PID 672 set thread context of 3176 672 spoolsv.exe diskperf.exe PID 788 set thread context of 3204 788 spoolsv.exe spoolsv.exe PID 788 set thread context of 3212 788 spoolsv.exe diskperf.exe PID 1756 set thread context of 3236 1756 spoolsv.exe spoolsv.exe PID 1756 set thread context of 3244 1756 spoolsv.exe diskperf.exe PID 2020 set thread context of 3272 2020 spoolsv.exe spoolsv.exe PID 2020 set thread context of 3280 2020 spoolsv.exe diskperf.exe PID 2040 set thread context of 3312 2040 spoolsv.exe spoolsv.exe PID 2040 set thread context of 3320 2040 spoolsv.exe diskperf.exe PID 1560 set thread context of 3352 1560 spoolsv.exe spoolsv.exe PID 1560 set thread context of 3360 1560 spoolsv.exe diskperf.exe PID 916 set thread context of 3392 916 spoolsv.exe spoolsv.exe PID 916 set thread context of 3400 916 spoolsv.exe diskperf.exe PID 952 set thread context of 3428 952 spoolsv.exe spoolsv.exe PID 952 set thread context of 3436 952 spoolsv.exe diskperf.exe PID 1544 set thread context of 3464 1544 spoolsv.exe spoolsv.exe PID 1544 set thread context of 3472 1544 spoolsv.exe diskperf.exe PID 292 set thread context of 3492 292 spoolsv.exe spoolsv.exe PID 292 set thread context of 3500 292 spoolsv.exe diskperf.exe PID 340 set thread context of 3528 340 spoolsv.exe spoolsv.exe PID 340 set thread context of 3536 340 spoolsv.exe diskperf.exe PID 1676 set thread context of 3564 1676 spoolsv.exe spoolsv.exe PID 1676 set thread context of 3572 1676 spoolsv.exe diskperf.exe PID 2036 set thread context of 3600 2036 spoolsv.exe spoolsv.exe PID 2036 set thread context of 3608 2036 spoolsv.exe diskperf.exe PID 1816 set thread context of 3628 1816 spoolsv.exe spoolsv.exe PID 1816 set thread context of 3636 1816 spoolsv.exe diskperf.exe PID 804 set thread context of 3652 804 spoolsv.exe spoolsv.exe PID 804 set thread context of 3660 804 spoolsv.exe diskperf.exe PID 620 set thread context of 3688 620 spoolsv.exe spoolsv.exe PID 620 set thread context of 3696 620 spoolsv.exe diskperf.exe PID 860 set thread context of 3720 860 spoolsv.exe spoolsv.exe PID 860 set thread context of 3728 860 spoolsv.exe diskperf.exe PID 284 set thread context of 3752 284 spoolsv.exe spoolsv.exe PID 284 set thread context of 3772 284 spoolsv.exe diskperf.exe PID 1160 set thread context of 3780 1160 spoolsv.exe spoolsv.exe PID 1160 set thread context of 3800 1160 spoolsv.exe diskperf.exe PID 1688 set thread context of 3808 1688 spoolsv.exe spoolsv.exe PID 1688 set thread context of 3816 1688 spoolsv.exe diskperf.exe PID 1256 set thread context of 3824 1256 spoolsv.exe spoolsv.exe PID 644 set thread context of 3852 644 spoolsv.exe spoolsv.exe PID 644 set thread context of 3860 644 spoolsv.exe diskperf.exe PID 1256 set thread context of 3844 1256 spoolsv.exe diskperf.exe PID 532 set thread context of 3884 532 spoolsv.exe spoolsv.exe PID 532 set thread context of 3892 532 spoolsv.exe diskperf.exe PID 1620 set thread context of 3900 1620 spoolsv.exe spoolsv.exe PID 1620 set thread context of 3908 1620 spoolsv.exe diskperf.exe PID 2016 set thread context of 3916 2016 spoolsv.exe spoolsv.exe PID 2016 set thread context of 3936 2016 spoolsv.exe diskperf.exe PID 1276 set thread context of 3944 1276 spoolsv.exe spoolsv.exe PID 960 set thread context of 3960 960 spoolsv.exe spoolsv.exe PID 1276 set thread context of 3952 1276 spoolsv.exe diskperf.exe PID 960 set thread context of 3968 960 spoolsv.exe diskperf.exe PID 972 set thread context of 3976 972 spoolsv.exe spoolsv.exe PID 972 set thread context of 3984 972 spoolsv.exe diskperf.exe -
Drops file in Windows directory 4 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe bc4a2d6d_by_Libranalysis.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exeexplorer.exepid process 1636 bc4a2d6d_by_Libranalysis.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 668 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1636 bc4a2d6d_by_Libranalysis.exe 1636 bc4a2d6d_by_Libranalysis.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 3096 spoolsv.exe 3096 spoolsv.exe 3132 spoolsv.exe 3132 spoolsv.exe 3168 spoolsv.exe 3168 spoolsv.exe 3204 spoolsv.exe 3204 spoolsv.exe 3236 spoolsv.exe 3236 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 3312 spoolsv.exe 3312 spoolsv.exe 3352 spoolsv.exe 3352 spoolsv.exe 3392 spoolsv.exe 3392 spoolsv.exe 3428 spoolsv.exe 3428 spoolsv.exe 3464 spoolsv.exe 3464 spoolsv.exe 3492 spoolsv.exe 3492 spoolsv.exe 3528 spoolsv.exe 3528 spoolsv.exe 3564 spoolsv.exe 3564 spoolsv.exe 3600 spoolsv.exe 3600 spoolsv.exe 3628 spoolsv.exe 3628 spoolsv.exe 3652 spoolsv.exe 3652 spoolsv.exe 3688 spoolsv.exe 3688 spoolsv.exe 3720 spoolsv.exe 3720 spoolsv.exe 3752 spoolsv.exe 3752 spoolsv.exe 3780 spoolsv.exe 3780 spoolsv.exe 3808 spoolsv.exe 3808 spoolsv.exe 3824 spoolsv.exe 3852 spoolsv.exe 3824 spoolsv.exe 3852 spoolsv.exe 3884 spoolsv.exe 3884 spoolsv.exe 3900 spoolsv.exe 3916 spoolsv.exe 3944 spoolsv.exe 3900 spoolsv.exe 3960 spoolsv.exe 3976 spoolsv.exe 3916 spoolsv.exe 3976 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bc4a2d6d_by_Libranalysis.exebc4a2d6d_by_Libranalysis.exeexplorer.exeexplorer.exedescription pid process target process PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1636 1084 bc4a2d6d_by_Libranalysis.exe bc4a2d6d_by_Libranalysis.exe PID 1084 wrote to memory of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 1084 wrote to memory of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 1084 wrote to memory of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 1084 wrote to memory of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 1084 wrote to memory of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 1084 wrote to memory of 1640 1084 bc4a2d6d_by_Libranalysis.exe diskperf.exe PID 1636 wrote to memory of 600 1636 bc4a2d6d_by_Libranalysis.exe explorer.exe PID 1636 wrote to memory of 600 1636 bc4a2d6d_by_Libranalysis.exe explorer.exe PID 1636 wrote to memory of 600 1636 bc4a2d6d_by_Libranalysis.exe explorer.exe PID 1636 wrote to memory of 600 1636 bc4a2d6d_by_Libranalysis.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 668 600 explorer.exe explorer.exe PID 600 wrote to memory of 328 600 explorer.exe diskperf.exe PID 600 wrote to memory of 328 600 explorer.exe diskperf.exe PID 600 wrote to memory of 328 600 explorer.exe diskperf.exe PID 600 wrote to memory of 328 600 explorer.exe diskperf.exe PID 600 wrote to memory of 328 600 explorer.exe diskperf.exe PID 600 wrote to memory of 328 600 explorer.exe diskperf.exe PID 668 wrote to memory of 1368 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1368 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1368 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1368 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1484 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1484 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1484 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1484 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 672 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 672 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 672 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 672 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 788 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 788 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 788 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 788 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1756 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1756 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1756 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1756 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2020 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2020 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2020 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2020 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2040 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2040 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2040 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 2040 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1560 668 explorer.exe spoolsv.exe PID 668 wrote to memory of 1560 668 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc4a2d6d_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\bc4a2d6d_by_Libranalysis.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bc4a2d6d_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\bc4a2d6d_by_Libranalysis.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeMD5
bc4a2d6d59a0aee1a434e93f5d59019a
SHA12403a1c0017b46d2357f3730b9d5c16fa7284a28
SHA256926509aff0ec48ac354fe49b372f8e2b8d05fe97ba5a1828b422ca75b95cb0ea
SHA5125b808a743ed3663656417dc23b9614dc89ab25c5814040f76afa356659ce3614431a2580963e977c9169d262ba80a4238d70ab53b7317f1b6003fd5111e8ba47
-
C:\Users\Admin\AppData\Local\Temp\Disk.sysMD5
b61fca770156484b923df6aa03ab949e
SHA1c97b1c74613b54247b20fd8a946934c411cb0d5e
SHA2564654b6a952d5f663db28fd4bcb6bba763ed25ce764461d3e83c7f7f1b755f0bc
SHA51279ef4bec927abde32bfd3b4e95e992a5a0ce7c4c270b8d8eb60d3b0547c78a3b830292852a0f05f46b3eff5fb1b9d8727a637153537aed15ec7fa2ce5e3f648c
-
C:\Windows\system\explorer.exeMD5
b61fca770156484b923df6aa03ab949e
SHA1c97b1c74613b54247b20fd8a946934c411cb0d5e
SHA2564654b6a952d5f663db28fd4bcb6bba763ed25ce764461d3e83c7f7f1b755f0bc
SHA51279ef4bec927abde32bfd3b4e95e992a5a0ce7c4c270b8d8eb60d3b0547c78a3b830292852a0f05f46b3eff5fb1b9d8727a637153537aed15ec7fa2ce5e3f648c
-
C:\Windows\system\explorer.exeMD5
b61fca770156484b923df6aa03ab949e
SHA1c97b1c74613b54247b20fd8a946934c411cb0d5e
SHA2564654b6a952d5f663db28fd4bcb6bba763ed25ce764461d3e83c7f7f1b755f0bc
SHA51279ef4bec927abde32bfd3b4e95e992a5a0ce7c4c270b8d8eb60d3b0547c78a3b830292852a0f05f46b3eff5fb1b9d8727a637153537aed15ec7fa2ce5e3f648c
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
C:\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\??\c:\windows\system\explorer.exeMD5
b61fca770156484b923df6aa03ab949e
SHA1c97b1c74613b54247b20fd8a946934c411cb0d5e
SHA2564654b6a952d5f663db28fd4bcb6bba763ed25ce764461d3e83c7f7f1b755f0bc
SHA51279ef4bec927abde32bfd3b4e95e992a5a0ce7c4c270b8d8eb60d3b0547c78a3b830292852a0f05f46b3eff5fb1b9d8727a637153537aed15ec7fa2ce5e3f648c
-
\Windows\system\explorer.exeMD5
b61fca770156484b923df6aa03ab949e
SHA1c97b1c74613b54247b20fd8a946934c411cb0d5e
SHA2564654b6a952d5f663db28fd4bcb6bba763ed25ce764461d3e83c7f7f1b755f0bc
SHA51279ef4bec927abde32bfd3b4e95e992a5a0ce7c4c270b8d8eb60d3b0547c78a3b830292852a0f05f46b3eff5fb1b9d8727a637153537aed15ec7fa2ce5e3f648c
-
\Windows\system\explorer.exeMD5
b61fca770156484b923df6aa03ab949e
SHA1c97b1c74613b54247b20fd8a946934c411cb0d5e
SHA2564654b6a952d5f663db28fd4bcb6bba763ed25ce764461d3e83c7f7f1b755f0bc
SHA51279ef4bec927abde32bfd3b4e95e992a5a0ce7c4c270b8d8eb60d3b0547c78a3b830292852a0f05f46b3eff5fb1b9d8727a637153537aed15ec7fa2ce5e3f648c
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
\Windows\system\spoolsv.exeMD5
ec2f354b2cbd1c10e576a281341f0116
SHA156e5181c8dbb915de47abb2891d634dd718e7a4b
SHA256f8c7f57bb41fbe3aeef51dadc0b9d06032927e47ac0a934eb5677109d590d4b1
SHA51269fb84baa577dba5d3c3d25b559949840fe0b8f6c52aad0d48a6742f74fe4a8bb8179ef392688656c3595176abaf952f2f61eb47c24586bc948d0c493e288a48
-
memory/272-247-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/272-237-0x0000000000000000-mapping.dmp
-
memory/284-206-0x0000000000000000-mapping.dmp
-
memory/284-210-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/288-248-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/288-239-0x0000000000000000-mapping.dmp
-
memory/292-170-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/292-162-0x0000000000000000-mapping.dmp
-
memory/328-86-0x0000000000411000-mapping.dmp
-
memory/340-167-0x0000000000000000-mapping.dmp
-
memory/532-221-0x0000000000000000-mapping.dmp
-
memory/556-264-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/556-250-0x0000000000000000-mapping.dmp
-
memory/600-78-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/600-270-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/600-262-0x0000000000000000-mapping.dmp
-
memory/600-73-0x0000000000000000-mapping.dmp
-
memory/620-198-0x0000000000000000-mapping.dmp
-
memory/620-208-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/644-215-0x0000000000000000-mapping.dmp
-
memory/668-81-0x0000000000403670-mapping.dmp
-
memory/672-107-0x0000000000000000-mapping.dmp
-
memory/672-111-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/728-294-0x0000000000000000-mapping.dmp
-
memory/756-305-0x0000000000000000-mapping.dmp
-
memory/756-310-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/776-307-0x0000000000000000-mapping.dmp
-
memory/788-122-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/788-114-0x0000000000000000-mapping.dmp
-
memory/804-191-0x0000000000000000-mapping.dmp
-
memory/852-258-0x0000000000000000-mapping.dmp
-
memory/860-209-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/860-203-0x0000000000000000-mapping.dmp
-
memory/888-249-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/888-241-0x0000000000000000-mapping.dmp
-
memory/916-147-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/916-143-0x0000000000000000-mapping.dmp
-
memory/952-150-0x0000000000000000-mapping.dmp
-
memory/952-158-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/960-235-0x0000000000000000-mapping.dmp
-
memory/960-246-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/972-233-0x0000000000000000-mapping.dmp
-
memory/972-245-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1056-308-0x0000000000000000-mapping.dmp
-
memory/1056-313-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1084-60-0x00000000752F1000-0x00000000752F3000-memory.dmpFilesize
8KB
-
memory/1084-61-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1112-273-0x0000000000000000-mapping.dmp
-
memory/1160-224-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1160-213-0x0000000000000000-mapping.dmp
-
memory/1172-304-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1172-297-0x0000000000000000-mapping.dmp
-
memory/1228-283-0x0000000000000000-mapping.dmp
-
memory/1256-226-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1256-217-0x0000000000000000-mapping.dmp
-
memory/1276-231-0x0000000000000000-mapping.dmp
-
memory/1276-244-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1300-306-0x0000000000000000-mapping.dmp
-
memory/1300-311-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1308-315-0x0000000000000000-mapping.dmp
-
memory/1368-94-0x0000000000000000-mapping.dmp
-
memory/1368-98-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1432-309-0x0000000000000000-mapping.dmp
-
memory/1476-271-0x0000000000000000-mapping.dmp
-
memory/1484-102-0x0000000000000000-mapping.dmp
-
memory/1484-110-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1504-269-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/1504-260-0x0000000000000000-mapping.dmp
-
memory/1544-159-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1544-155-0x0000000000000000-mapping.dmp
-
memory/1552-287-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1552-275-0x0000000000000000-mapping.dmp
-
memory/1556-299-0x0000000000000000-mapping.dmp
-
memory/1560-138-0x0000000000000000-mapping.dmp
-
memory/1560-146-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1564-256-0x0000000000000000-mapping.dmp
-
memory/1564-267-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1576-292-0x0000000000000000-mapping.dmp
-
memory/1620-219-0x0000000000000000-mapping.dmp
-
memory/1636-63-0x0000000000403670-mapping.dmp
-
memory/1636-62-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1636-76-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1640-67-0x0000000000411000-mapping.dmp
-
memory/1640-66-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1640-77-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1676-174-0x0000000000000000-mapping.dmp
-
memory/1676-182-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1680-295-0x0000000000000000-mapping.dmp
-
memory/1688-223-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1688-211-0x0000000000000000-mapping.dmp
-
memory/1724-281-0x0000000000000000-mapping.dmp
-
memory/1748-277-0x0000000000000000-mapping.dmp
-
memory/1756-119-0x0000000000000000-mapping.dmp
-
memory/1756-123-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1816-186-0x0000000000000000-mapping.dmp
-
memory/1860-290-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1860-279-0x0000000000000000-mapping.dmp
-
memory/1864-265-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1864-252-0x0000000000000000-mapping.dmp
-
memory/1960-296-0x0000000000000000-mapping.dmp
-
memory/2008-254-0x0000000000000000-mapping.dmp
-
memory/2016-229-0x0000000000000000-mapping.dmp
-
memory/2016-243-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2020-126-0x0000000000000000-mapping.dmp
-
memory/2020-134-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2036-179-0x0000000000000000-mapping.dmp
-
memory/2036-183-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2040-135-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2040-131-0x0000000000000000-mapping.dmp