Analysis
-
max time kernel
151s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 02:21
Behavioral task
behavioral1
Sample
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe
Resource
win10v2004-20220812-en
General
-
Target
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe
-
Size
347KB
-
MD5
5180d37dfabb7fa22fd7f1a02fc4babb
-
SHA1
af3037f4c8f0300fa47c71261d70355d3ac66a9a
-
SHA256
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
-
SHA512
1c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
SSDEEP
6144:MxLjTaCEbW1gIPp6nlml+19yxKpbj+mYl+eL:MxWBi3E11pbymYlV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
wmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exepid process 888 wmsrvc.exe 1688 wmsrvc.exe 1944 wmsrvc.exe 456 wmsrvc.exe 1360 wmsrvc.exe 1416 wmsrvc.exe 1732 wmsrvc.exe 1672 wmsrvc.exe 1988 wmsrvc.exe 1752 wmsrvc.exe 912 wmsrvc.exe 1796 wmsrvc.exe 1172 wmsrvc.exe 396 wmsrvc.exe 1264 wmsrvc.exe 656 wmsrvc.exe 812 wmsrvc.exe 1516 wmsrvc.exe 912 wmsrvc.exe 1924 wmsrvc.exe 1712 wmsrvc.exe 1444 wmsrvc.exe 1016 wmsrvc.exe 1472 wmsrvc.exe 1576 wmsrvc.exe 932 wmsrvc.exe 1172 wmsrvc.exe 344 wmsrvc.exe 1948 wmsrvc.exe 644 wmsrvc.exe 976 wmsrvc.exe 860 wmsrvc.exe 1048 wmsrvc.exe 1740 wmsrvc.exe 1728 wmsrvc.exe 1712 wmsrvc.exe 1948 wmsrvc.exe 1912 wmsrvc.exe 976 wmsrvc.exe 1576 wmsrvc.exe 1360 wmsrvc.exe 1548 wmsrvc.exe 1172 wmsrvc.exe 1652 wmsrvc.exe 808 wmsrvc.exe 1492 wmsrvc.exe 772 wmsrvc.exe 1068 wmsrvc.exe 1784 wmsrvc.exe 888 wmsrvc.exe 1920 wmsrvc.exe 2028 wmsrvc.exe 388 wmsrvc.exe 1976 wmsrvc.exe 908 wmsrvc.exe 1872 wmsrvc.exe 1740 wmsrvc.exe 1188 wmsrvc.exe 1948 wmsrvc.exe 1592 wmsrvc.exe 808 wmsrvc.exe 812 wmsrvc.exe 1248 wmsrvc.exe 1596 wmsrvc.exe -
Processes:
resource yara_rule behavioral1/memory/976-60-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/888-77-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1944-93-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1360-111-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1732-125-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1988-145-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/912-152-0x0000000000400000-0x000000000046A000-memory.dmp upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/912-160-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1172-176-0x0000000000400000-0x000000000046A000-memory.dmp upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1264-185-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/912-222-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1712-239-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx C:\Windows\SysWOW64\wmsrvc.exe upx behavioral1/memory/1016-256-0x0000000000400000-0x000000000046A000-memory.dmp upx \Windows\SysWOW64\wmsrvc.exe upx \Windows\SysWOW64\wmsrvc.exe upx -
Loads dropped DLL 64 IoCs
Processes:
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exepid process 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe 1688 wmsrvc.exe 1688 wmsrvc.exe 456 wmsrvc.exe 456 wmsrvc.exe 1416 wmsrvc.exe 1416 wmsrvc.exe 1672 wmsrvc.exe 1672 wmsrvc.exe 1752 wmsrvc.exe 1752 wmsrvc.exe 1796 wmsrvc.exe 1796 wmsrvc.exe 396 wmsrvc.exe 396 wmsrvc.exe 656 wmsrvc.exe 656 wmsrvc.exe 1516 wmsrvc.exe 1516 wmsrvc.exe 1924 wmsrvc.exe 1924 wmsrvc.exe 1444 wmsrvc.exe 1444 wmsrvc.exe 1472 wmsrvc.exe 1472 wmsrvc.exe 932 wmsrvc.exe 932 wmsrvc.exe 344 wmsrvc.exe 344 wmsrvc.exe 644 wmsrvc.exe 644 wmsrvc.exe 860 wmsrvc.exe 860 wmsrvc.exe 1740 wmsrvc.exe 1740 wmsrvc.exe 1712 wmsrvc.exe 1712 wmsrvc.exe 1912 wmsrvc.exe 1912 wmsrvc.exe 1576 wmsrvc.exe 1576 wmsrvc.exe 1548 wmsrvc.exe 1548 wmsrvc.exe 1652 wmsrvc.exe 1652 wmsrvc.exe 1492 wmsrvc.exe 1492 wmsrvc.exe 1068 wmsrvc.exe 1068 wmsrvc.exe 888 wmsrvc.exe 888 wmsrvc.exe 2028 wmsrvc.exe 2028 wmsrvc.exe 1976 wmsrvc.exe 1976 wmsrvc.exe 1872 wmsrvc.exe 1872 wmsrvc.exe 1188 wmsrvc.exe 1188 wmsrvc.exe 1592 wmsrvc.exe 1592 wmsrvc.exe 812 wmsrvc.exe 812 wmsrvc.exe -
Drops file in System32 directory 64 IoCs
Processes:
wmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exedescription ioc process File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File opened for modification C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe File created C:\Windows\SysWOW64\wmsrvc.exe wmsrvc.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exedescription pid process target process PID 976 set thread context of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 888 set thread context of 1688 888 wmsrvc.exe wmsrvc.exe PID 1944 set thread context of 456 1944 wmsrvc.exe wmsrvc.exe PID 1360 set thread context of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1732 set thread context of 1672 1732 wmsrvc.exe wmsrvc.exe PID 1988 set thread context of 1752 1988 wmsrvc.exe wmsrvc.exe PID 912 set thread context of 1796 912 wmsrvc.exe wmsrvc.exe PID 1172 set thread context of 396 1172 wmsrvc.exe wmsrvc.exe PID 1264 set thread context of 656 1264 wmsrvc.exe wmsrvc.exe PID 812 set thread context of 1516 812 wmsrvc.exe wmsrvc.exe PID 912 set thread context of 1924 912 wmsrvc.exe wmsrvc.exe PID 1712 set thread context of 1444 1712 wmsrvc.exe wmsrvc.exe PID 1016 set thread context of 1472 1016 wmsrvc.exe wmsrvc.exe PID 1576 set thread context of 932 1576 wmsrvc.exe wmsrvc.exe PID 1172 set thread context of 344 1172 wmsrvc.exe wmsrvc.exe PID 1948 set thread context of 644 1948 wmsrvc.exe wmsrvc.exe PID 976 set thread context of 860 976 wmsrvc.exe wmsrvc.exe PID 1048 set thread context of 1740 1048 wmsrvc.exe wmsrvc.exe PID 1728 set thread context of 1712 1728 wmsrvc.exe wmsrvc.exe PID 1948 set thread context of 1912 1948 wmsrvc.exe wmsrvc.exe PID 976 set thread context of 1576 976 wmsrvc.exe wmsrvc.exe PID 1360 set thread context of 1548 1360 wmsrvc.exe wmsrvc.exe PID 1172 set thread context of 1652 1172 wmsrvc.exe wmsrvc.exe PID 808 set thread context of 1492 808 wmsrvc.exe wmsrvc.exe PID 772 set thread context of 1068 772 wmsrvc.exe wmsrvc.exe PID 1784 set thread context of 888 1784 wmsrvc.exe wmsrvc.exe PID 1920 set thread context of 2028 1920 wmsrvc.exe wmsrvc.exe PID 388 set thread context of 1976 388 wmsrvc.exe wmsrvc.exe PID 908 set thread context of 1872 908 wmsrvc.exe wmsrvc.exe PID 1740 set thread context of 1188 1740 wmsrvc.exe wmsrvc.exe PID 1948 set thread context of 1592 1948 wmsrvc.exe wmsrvc.exe PID 808 set thread context of 812 808 wmsrvc.exe wmsrvc.exe PID 1248 set thread context of 1596 1248 wmsrvc.exe wmsrvc.exe PID 1824 set thread context of 1272 1824 wmsrvc.exe wmsrvc.exe PID 1944 set thread context of 560 1944 wmsrvc.exe wmsrvc.exe PID 580 set thread context of 1368 580 wmsrvc.exe wmsrvc.exe PID 1736 set thread context of 1700 1736 wmsrvc.exe wmsrvc.exe PID 2012 set thread context of 472 2012 wmsrvc.exe wmsrvc.exe PID 1652 set thread context of 2032 1652 wmsrvc.exe wmsrvc.exe PID 976 set thread context of 1500 976 wmsrvc.exe wmsrvc.exe PID 1748 set thread context of 984 1748 wmsrvc.exe wmsrvc.exe PID 1384 set thread context of 1092 1384 wmsrvc.exe wmsrvc.exe PID 1968 set thread context of 936 1968 wmsrvc.exe wmsrvc.exe PID 912 set thread context of 1320 912 wmsrvc.exe wmsrvc.exe PID 1740 set thread context of 572 1740 wmsrvc.exe wmsrvc.exe PID 1652 set thread context of 1016 1652 wmsrvc.exe wmsrvc.exe PID 1736 set thread context of 772 1736 wmsrvc.exe wmsrvc.exe PID 1784 set thread context of 1988 1784 wmsrvc.exe wmsrvc.exe PID 960 set thread context of 1428 960 wmsrvc.exe wmsrvc.exe PID 1592 set thread context of 824 1592 wmsrvc.exe wmsrvc.exe PID 2012 set thread context of 1196 2012 wmsrvc.exe wmsrvc.exe PID 1168 set thread context of 1680 1168 wmsrvc.exe wmsrvc.exe PID 1100 set thread context of 1388 1100 wmsrvc.exe wmsrvc.exe PID 1608 set thread context of 1364 1608 wmsrvc.exe wmsrvc.exe PID 1124 set thread context of 1308 1124 wmsrvc.exe wmsrvc.exe PID 1212 set thread context of 1572 1212 wmsrvc.exe wmsrvc.exe PID 1756 set thread context of 1552 1756 wmsrvc.exe wmsrvc.exe PID 1580 set thread context of 772 1580 wmsrvc.exe wmsrvc.exe PID 1988 set thread context of 552 1988 wmsrvc.exe wmsrvc.exe PID 1140 set thread context of 1592 1140 wmsrvc.exe wmsrvc.exe PID 1460 set thread context of 1372 1460 wmsrvc.exe wmsrvc.exe PID 1740 set thread context of 772 1740 wmsrvc.exe wmsrvc.exe PID 1908 set thread context of 1204 1908 wmsrvc.exe wmsrvc.exe PID 1716 set thread context of 824 1716 wmsrvc.exe wmsrvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exepid process 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe 1688 wmsrvc.exe 456 wmsrvc.exe 1416 wmsrvc.exe 1672 wmsrvc.exe 1752 wmsrvc.exe 1796 wmsrvc.exe 396 wmsrvc.exe 656 wmsrvc.exe 1516 wmsrvc.exe 1924 wmsrvc.exe 1444 wmsrvc.exe 1472 wmsrvc.exe 932 wmsrvc.exe 344 wmsrvc.exe 644 wmsrvc.exe 860 wmsrvc.exe 1740 wmsrvc.exe 1712 wmsrvc.exe 1912 wmsrvc.exe 1576 wmsrvc.exe 1548 wmsrvc.exe 1652 wmsrvc.exe 1492 wmsrvc.exe 1068 wmsrvc.exe 888 wmsrvc.exe 2028 wmsrvc.exe 1976 wmsrvc.exe 1872 wmsrvc.exe 1188 wmsrvc.exe 1592 wmsrvc.exe 812 wmsrvc.exe 1596 wmsrvc.exe 1272 wmsrvc.exe 560 wmsrvc.exe 1368 wmsrvc.exe 1700 wmsrvc.exe 472 wmsrvc.exe 2032 wmsrvc.exe 1500 wmsrvc.exe 984 wmsrvc.exe 1092 wmsrvc.exe 936 wmsrvc.exe 1320 wmsrvc.exe 572 wmsrvc.exe 1016 wmsrvc.exe 772 wmsrvc.exe 1988 wmsrvc.exe 1428 wmsrvc.exe 824 wmsrvc.exe 1196 wmsrvc.exe 1680 wmsrvc.exe 1388 wmsrvc.exe 1364 wmsrvc.exe 1308 wmsrvc.exe 1572 wmsrvc.exe 1552 wmsrvc.exe 772 wmsrvc.exe 552 wmsrvc.exe 1592 wmsrvc.exe 1372 wmsrvc.exe 772 wmsrvc.exe 1204 wmsrvc.exe 824 wmsrvc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exepid process 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe 888 wmsrvc.exe 1944 wmsrvc.exe 1360 wmsrvc.exe 1732 wmsrvc.exe 1988 wmsrvc.exe 912 wmsrvc.exe 1172 wmsrvc.exe 1264 wmsrvc.exe 812 wmsrvc.exe 912 wmsrvc.exe 1712 wmsrvc.exe 1016 wmsrvc.exe 1576 wmsrvc.exe 1172 wmsrvc.exe 1948 wmsrvc.exe 976 wmsrvc.exe 1048 wmsrvc.exe 1728 wmsrvc.exe 1948 wmsrvc.exe 976 wmsrvc.exe 1360 wmsrvc.exe 1172 wmsrvc.exe 808 wmsrvc.exe 772 wmsrvc.exe 1784 wmsrvc.exe 1920 wmsrvc.exe 388 wmsrvc.exe 908 wmsrvc.exe 1740 wmsrvc.exe 1948 wmsrvc.exe 808 wmsrvc.exe 1248 wmsrvc.exe 1824 wmsrvc.exe 1944 wmsrvc.exe 580 wmsrvc.exe 1736 wmsrvc.exe 2012 wmsrvc.exe 1652 wmsrvc.exe 976 wmsrvc.exe 1748 wmsrvc.exe 1384 wmsrvc.exe 1968 wmsrvc.exe 912 wmsrvc.exe 1740 wmsrvc.exe 1652 wmsrvc.exe 1736 wmsrvc.exe 1784 wmsrvc.exe 960 wmsrvc.exe 1592 wmsrvc.exe 2012 wmsrvc.exe 1168 wmsrvc.exe 1100 wmsrvc.exe 1608 wmsrvc.exe 1124 wmsrvc.exe 1212 wmsrvc.exe 1756 wmsrvc.exe 1580 wmsrvc.exe 1988 wmsrvc.exe 1140 wmsrvc.exe 1460 wmsrvc.exe 1740 wmsrvc.exe 1908 wmsrvc.exe 1716 wmsrvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exed3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exewmsrvc.exedescription pid process target process PID 976 wrote to memory of 1924 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe cmd.exe PID 976 wrote to memory of 1924 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe cmd.exe PID 976 wrote to memory of 1924 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe cmd.exe PID 976 wrote to memory of 1924 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe cmd.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 976 wrote to memory of 2036 976 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe PID 2036 wrote to memory of 888 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe wmsrvc.exe PID 2036 wrote to memory of 888 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe wmsrvc.exe PID 2036 wrote to memory of 888 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe wmsrvc.exe PID 2036 wrote to memory of 888 2036 d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe wmsrvc.exe PID 888 wrote to memory of 1512 888 wmsrvc.exe cmd.exe PID 888 wrote to memory of 1512 888 wmsrvc.exe cmd.exe PID 888 wrote to memory of 1512 888 wmsrvc.exe cmd.exe PID 888 wrote to memory of 1512 888 wmsrvc.exe cmd.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 888 wrote to memory of 1688 888 wmsrvc.exe wmsrvc.exe PID 1688 wrote to memory of 1944 1688 wmsrvc.exe wmsrvc.exe PID 1688 wrote to memory of 1944 1688 wmsrvc.exe wmsrvc.exe PID 1688 wrote to memory of 1944 1688 wmsrvc.exe wmsrvc.exe PID 1688 wrote to memory of 1944 1688 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 1620 1944 wmsrvc.exe cmd.exe PID 1944 wrote to memory of 1620 1944 wmsrvc.exe cmd.exe PID 1944 wrote to memory of 1620 1944 wmsrvc.exe cmd.exe PID 1944 wrote to memory of 1620 1944 wmsrvc.exe cmd.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 1944 wrote to memory of 456 1944 wmsrvc.exe wmsrvc.exe PID 456 wrote to memory of 1360 456 wmsrvc.exe wmsrvc.exe PID 456 wrote to memory of 1360 456 wmsrvc.exe wmsrvc.exe PID 456 wrote to memory of 1360 456 wmsrvc.exe wmsrvc.exe PID 456 wrote to memory of 1360 456 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 672 1360 wmsrvc.exe cmd.exe PID 1360 wrote to memory of 672 1360 wmsrvc.exe cmd.exe PID 1360 wrote to memory of 672 1360 wmsrvc.exe cmd.exe PID 1360 wrote to memory of 672 1360 wmsrvc.exe cmd.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe PID 1360 wrote to memory of 1416 1360 wmsrvc.exe wmsrvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe"C:\Users\Admin\AppData\Local\Temp\d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø2⤵
-
C:\Users\Admin\AppData\Local\Temp\d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe"C:\Users\Admin\AppData\Local\Temp\d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Users\Admin\AppData\Local\Temp\D3A5CE~1.EXE3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø4⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø6⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø8⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø10⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø12⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø14⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø18⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø20⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø22⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø24⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø26⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø28⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø30⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø32⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø34⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø36⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø38⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø40⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø42⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø44⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø46⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"46⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø48⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"48⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø50⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø52⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"52⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø54⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø56⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø58⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø60⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø62⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø64⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø66⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"66⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø68⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"68⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø70⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"70⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø72⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"72⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø74⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"74⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø76⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"76⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe77⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø78⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"78⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø80⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"80⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe81⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø82⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø84⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"84⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø86⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø88⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"88⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø90⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"90⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø92⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"92⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe93⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø94⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"94⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø96⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"96⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø98⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"98⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø100⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"100⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø102⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"102⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe103⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø104⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"104⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø106⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"106⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø108⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"108⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe109⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø110⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"110⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe111⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø112⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"112⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe113⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø114⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"114⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø116⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"116⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe117⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø118⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"118⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe119⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø120⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"120⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe121⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø122⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"122⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe123⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø124⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"124⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe125⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø126⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"126⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe127⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø128⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"128⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe129⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø130⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"130⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe131⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø132⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"132⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe133⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø134⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"134⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe135⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø136⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"136⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe137⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø138⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"138⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe139⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø140⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"140⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe141⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø142⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"142⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe143⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø144⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"144⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe145⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø146⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"146⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe147⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø148⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"148⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe149⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø150⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"150⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe151⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø152⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"152⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe153⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø154⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"154⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe155⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø156⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"156⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe157⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø158⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"158⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe159⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø160⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"160⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe161⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø162⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"162⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe163⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø164⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"164⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe165⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"166⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe167⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø168⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"168⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe169⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø170⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"170⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe171⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø172⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"172⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe173⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø174⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"174⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe175⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø176⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"176⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe177⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø178⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"178⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe179⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø180⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"180⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe181⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø182⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"182⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe183⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø184⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"184⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe185⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø186⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"186⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\system32\wmsrvc.exe" C:\Windows\SysWOW64\wmsrvc.exe187⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø188⤵
-
C:\Windows\SysWOW64\wmsrvc.exe"C:\Windows\SysWOW64\wmsrvc.exe"188⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø166⤵
-
C:\Windows\SysWOW64\cmd.execmd /c u³ ErâXA1H&x€Lþ„¼¡øòÙüBŽ‹6Rþâ‚Ø1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
C:\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
\Windows\SysWOW64\wmsrvc.exeFilesize
347KB
MD55180d37dfabb7fa22fd7f1a02fc4babb
SHA1af3037f4c8f0300fa47c71261d70355d3ac66a9a
SHA256d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043
SHA5121c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937
-
memory/272-364-0x0000000000000000-mapping.dmp
-
memory/344-291-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/344-289-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/344-285-0x0000000000431D8B-mapping.dmp
-
memory/396-184-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/396-174-0x0000000000431D8B-mapping.dmp
-
memory/456-90-0x0000000000431D8B-mapping.dmp
-
memory/456-95-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/456-96-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/456-102-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/560-352-0x0000000000000000-mapping.dmp
-
memory/592-188-0x0000000000000000-mapping.dmp
-
memory/644-296-0x0000000000431D8B-mapping.dmp
-
memory/644-301-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/644-303-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/656-190-0x0000000000431D8B-mapping.dmp
-
memory/656-200-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/672-105-0x0000000000000000-mapping.dmp
-
memory/812-198-0x0000000000000000-mapping.dmp
-
memory/848-266-0x0000000000000000-mapping.dmp
-
memory/860-308-0x0000000000431D8B-mapping.dmp
-
memory/860-314-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/888-66-0x0000000000000000-mapping.dmp
-
memory/888-77-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/912-212-0x0000000000000000-mapping.dmp
-
memory/912-152-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/912-222-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/912-160-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/912-149-0x0000000000000000-mapping.dmp
-
memory/932-274-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/932-280-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/932-268-0x0000000000431D8B-mapping.dmp
-
memory/976-348-0x0000000000000000-mapping.dmp
-
memory/976-302-0x0000000000000000-mapping.dmp
-
memory/976-310-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/976-60-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/976-356-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/984-294-0x0000000000000000-mapping.dmp
-
memory/1016-245-0x0000000000000000-mapping.dmp
-
memory/1016-256-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1048-321-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1048-313-0x0000000000000000-mapping.dmp
-
memory/1124-217-0x0000000000000000-mapping.dmp
-
memory/1172-167-0x0000000000000000-mapping.dmp
-
memory/1172-278-0x0000000000000000-mapping.dmp
-
memory/1172-376-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1172-176-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1196-172-0x0000000000000000-mapping.dmp
-
memory/1264-185-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1264-182-0x0000000000000000-mapping.dmp
-
memory/1360-368-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1360-360-0x0000000000000000-mapping.dmp
-
memory/1360-111-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1360-100-0x0000000000000000-mapping.dmp
-
memory/1416-113-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1416-118-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1416-112-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1416-107-0x0000000000431D8B-mapping.dmp
-
memory/1444-247-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1444-241-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1444-235-0x0000000000431D8B-mapping.dmp
-
memory/1468-250-0x0000000000000000-mapping.dmp
-
memory/1472-252-0x0000000000431D8B-mapping.dmp
-
memory/1472-263-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1472-258-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1472-257-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1492-387-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1512-72-0x0000000000000000-mapping.dmp
-
memory/1516-205-0x0000000000431D8B-mapping.dmp
-
memory/1516-214-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1548-370-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1548-371-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1560-233-0x0000000000000000-mapping.dmp
-
memory/1576-361-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1576-359-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1576-354-0x0000000000431D8B-mapping.dmp
-
memory/1576-270-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1576-261-0x0000000000000000-mapping.dmp
-
memory/1580-317-0x0000000000000000-mapping.dmp
-
memory/1620-88-0x0000000000000000-mapping.dmp
-
memory/1620-328-0x0000000000000000-mapping.dmp
-
memory/1652-380-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1652-379-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1672-134-0x0000000003580000-0x00000000035EA000-memory.dmpFilesize
424KB
-
memory/1672-135-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1672-129-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1672-123-0x0000000000431D8B-mapping.dmp
-
memory/1688-74-0x0000000000431D8B-mapping.dmp
-
memory/1688-79-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1688-80-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1688-85-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1704-283-0x0000000000000000-mapping.dmp
-
memory/1712-330-0x0000000000431D8B-mapping.dmp
-
memory/1712-335-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1712-337-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1712-239-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1712-228-0x0000000000000000-mapping.dmp
-
memory/1716-340-0x0000000000000000-mapping.dmp
-
memory/1728-324-0x0000000000000000-mapping.dmp
-
memory/1728-332-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1732-125-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1732-116-0x0000000000000000-mapping.dmp
-
memory/1740-319-0x0000000000431D8B-mapping.dmp
-
memory/1740-325-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1752-151-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1752-141-0x0000000000431D8B-mapping.dmp
-
memory/1752-146-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1760-121-0x0000000000000000-mapping.dmp
-
memory/1764-203-0x0000000000000000-mapping.dmp
-
memory/1796-157-0x0000000000431D8B-mapping.dmp
-
memory/1796-169-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1796-163-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1904-306-0x0000000000000000-mapping.dmp
-
memory/1912-347-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1912-349-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1912-342-0x0000000000431D8B-mapping.dmp
-
memory/1924-230-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1924-225-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1924-219-0x0000000000431D8B-mapping.dmp
-
memory/1924-56-0x0000000000000000-mapping.dmp
-
memory/1924-224-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1944-83-0x0000000000000000-mapping.dmp
-
memory/1944-93-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1948-290-0x0000000000000000-mapping.dmp
-
memory/1948-345-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1948-336-0x0000000000000000-mapping.dmp
-
memory/1948-298-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1988-145-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1988-133-0x0000000000000000-mapping.dmp
-
memory/2028-139-0x0000000000000000-mapping.dmp
-
memory/2032-155-0x0000000000000000-mapping.dmp
-
memory/2036-57-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/2036-68-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/2036-63-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/2036-62-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/2036-61-0x0000000075A81000-0x0000000075A83000-memory.dmpFilesize
8KB
-
memory/2036-58-0x0000000000431D8B-mapping.dmp