Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-05-2021 11:01
Static task
static1
Behavioral task
behavioral1
Sample
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe
Resource
win10v20210410
General
-
Target
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe
-
Size
1018KB
-
MD5
198353764b97d99ecbaddf2bc02830bb
-
SHA1
e43aa331854508a4f8486a473c7249038c6d4cdc
-
SHA256
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a
-
SHA512
3fdd3069f74fe5bd0f5797fd8ab027ae4622220083816cb6fa993b571a5c8814c1389e0a83f399635bfc3745a29a45d3c6e5f664a03c90ac3b91b92b730bf21b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Modifies system executable filetype association 2 TTPs 29 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Drops file in Drivers directory 60 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File created C:\Windows\SysWOW64\drivers\spools.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process File opened (read-only) \??\I: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\V: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\M: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\K: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\U: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\E: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\P: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\R: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\H: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\J: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\I: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\L: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\H: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\M: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\S: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\I: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\W: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\J: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\N: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\H: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\F: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\E: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\R: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\W: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\G: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\U: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\U: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\O: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\M: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\V: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\P: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\M: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\K: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\U: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\K: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\R: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\L: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\M: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\X: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\U: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\O: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\S: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\W: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\P: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\V: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\G: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\G: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\S: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\M: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\I: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\K: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\T: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\T: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\I: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\P: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\P: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\O: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\R: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\H: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\E: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\H: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\R: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\S: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe File opened (read-only) \??\E: 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Modifies registry class 29 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exepid process 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1128 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1128 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 484 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 484 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1400 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1400 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 188 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 188 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1496 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1496 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 752 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 752 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2020 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2020 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1296 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1296 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1828 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1828 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3184 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3184 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 356 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 356 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1504 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1504 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 860 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 860 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3684 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3684 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1664 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 1664 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2660 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 2660 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3568 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3568 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3516 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3516 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3708 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 3708 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exedescription pid process target process PID 3176 wrote to memory of 356 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe reg.exe PID 3176 wrote to memory of 356 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe reg.exe PID 3176 wrote to memory of 356 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe reg.exe PID 3176 wrote to memory of 1128 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3176 wrote to memory of 1128 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3176 wrote to memory of 1128 3176 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1128 wrote to memory of 3968 1128 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1128 wrote to memory of 3968 1128 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1128 wrote to memory of 3968 1128 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3968 wrote to memory of 3888 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3968 wrote to memory of 3888 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3968 wrote to memory of 3888 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3888 wrote to memory of 484 3888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3888 wrote to memory of 484 3888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3888 wrote to memory of 484 3888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 484 wrote to memory of 2332 484 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 484 wrote to memory of 2332 484 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 484 wrote to memory of 2332 484 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2332 wrote to memory of 1400 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2332 wrote to memory of 1400 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2332 wrote to memory of 1400 2332 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1400 wrote to memory of 188 1400 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1400 wrote to memory of 188 1400 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1400 wrote to memory of 188 1400 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 188 wrote to memory of 2208 188 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 188 wrote to memory of 2208 188 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 188 wrote to memory of 2208 188 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2208 wrote to memory of 3120 2208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2208 wrote to memory of 3120 2208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2208 wrote to memory of 3120 2208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3120 wrote to memory of 1496 3120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3120 wrote to memory of 1496 3120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3120 wrote to memory of 1496 3120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1496 wrote to memory of 752 1496 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1496 wrote to memory of 752 1496 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1496 wrote to memory of 752 1496 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 752 wrote to memory of 1120 752 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 752 wrote to memory of 1120 752 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 752 wrote to memory of 1120 752 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1120 wrote to memory of 2020 1120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1120 wrote to memory of 2020 1120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1120 wrote to memory of 2020 1120 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2020 wrote to memory of 3208 2020 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2020 wrote to memory of 3208 2020 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 2020 wrote to memory of 3208 2020 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3208 wrote to memory of 1296 3208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3208 wrote to memory of 1296 3208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3208 wrote to memory of 1296 3208 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1296 wrote to memory of 3968 1296 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1296 wrote to memory of 3968 1296 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1296 wrote to memory of 3968 1296 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3968 wrote to memory of 1888 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3968 wrote to memory of 1888 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3968 wrote to memory of 1888 3968 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1888 wrote to memory of 1828 1888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1888 wrote to memory of 1828 1888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1888 wrote to memory of 1828 1888 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1828 wrote to memory of 3184 1828 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1828 wrote to memory of 3184 1828 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 1828 wrote to memory of 3184 1828 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3184 wrote to memory of 356 3184 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3184 wrote to memory of 356 3184 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 3184 wrote to memory of 356 3184 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe PID 356 wrote to memory of 1504 356 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe 92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe"C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Drops file in Drivers directory
- Enumerates connected drives
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe2⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe3⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe4⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe5⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe6⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe7⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe8⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe9⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe10⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe11⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe12⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe13⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe14⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe15⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe16⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe17⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe18⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe19⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe20⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe21⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe22⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe23⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe24⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe25⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe26⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe27⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe28⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe29⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exeC:\Users\Admin\AppData\Local\Temp\92b3c5d9c17dd195eade7f25105b19f94ca0981e3354ae07007d2301a68d310a.exe30⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
1f21d9d6bae00ed0a8b4e00a679f5a6b
SHA11631ffefc698df44a6e6737b1324b9e2bac52eac
SHA2569a3f10da8dbfc704f79ead41e210c4680c5aa2c1ad80da200c827840faadbe8b
SHA512bfd20dd8510c8407d17becc440517d4349427791d4c72b695b59add6fd45650a6e5e3b5d39173625e6d5350d10eb4d533659bf4f206d8e8231d0d0ec6a03b765
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
870df959c9564b9577a9c891c1b94b8e
SHA1623bb9fa4ff9d05ac025e4811d4ea965595e3a00
SHA2564a866429c9d2bd77c93fb205e7c06901c70cfc0023c64e8214846216f94a346f
SHA512f25688a6b9d4e36a2bfb6bff2e9539fe45a0db91e15925c4f9868130780cd45e5981e39bcc538aee5741e7a18955c4f0ea8a26964a0962717a5f3344e29518be
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
8691c3516bcad2ccddde39ced136c0cf
SHA18163e50fd938a0bed0a014eefaf707577c4e1c9c
SHA25624ea60f4be492d6f56510e7f503e3823e60c7542bc8f91cb266b7b753aea29ab
SHA512eba6d4d44b14ed3a156f0649b1d37f25786c898e10cbb9f8c6ddc8d109cc2b5bc05ccc739a56e42141b56a3647b8be11f1c7e17d90e19ce012cfe8c319c96dac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
2681e0463371142c9a7f5d61ae7966d4
SHA16999198b8f3c8cab7392e9a5d92321b3834cbdb0
SHA256165d08f9bc5064931a853fe0b62aba53e045dbadaa31380744eaca96f8a8860c
SHA51296945ffa9409701e69c7257d38051595e95c9e0cc38671005023638a9a943b70f54d44119674ee7ef93991218b40c115d52602d1e22f8c65ecd6bf4dd25d06eb
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
e8f4afd0284b41869dfabeffdb67df60
SHA1c0394bf9e551d0b4dd9bbf7066aaaff52f52a76b
SHA256727c89c32929ca1b57ccb2020988110b2ed85ab3832172a1de1aa1edd5cb05b4
SHA512584e23364d91671799b8e75a56df776649d89b589fc3abe909cc9368a8db173235acc459837adc81a7ee0422677978be50a39c770c2bbc071cd927ec311c788e
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
af53b35cd2ec9f36ad31d93f50992a84
SHA139aaf6109c98eaba575f6ff7fe205a917bb79af1
SHA25601643a9617ba42ed69867bbc4268a4614cced17231f3f53cb1596b641401adf4
SHA51216fa44a56c57970873ef68611ba0d5ec4e90cbaa1d930bb7104631c37f7455eff89e79115231a1972887bfeb5361bd41259a5bc9e6db0e6ecf2313c367702123
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
9a7d258f52539257b77d0c1572ec4567
SHA18899143dae573d925182d7d695c9d94aab8e3992
SHA256ec8935e387b829e78f3a998322aed0c4dd5a4af538538bc6f271b276cd103172
SHA51203d5aad2d82f3c49cf3d160bdbc9bae5ed255104a9086a9961ef836aa4713178fdd84f779425e876beeb1e283c6e8f0aa79dcb45d329e95a20f0af317b4c84ef
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
5ae62b4fcce8918f9190487b24b68835
SHA1f261ef659205f71d78c48111123387fc9b1420f6
SHA256282b29d26338d3dd8a1009cdea7c2f66657f65d123dba2cfcb04ff196fc58a66
SHA5120f4840e32054e315b5b9b2b8c139ee98eae00aee1365ddb0fdc42bf0129e1a562c3344663986e17c7e5cc6f9246bef772c40f9a89a7eaa8131a2558511d15d01
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
d48f37482aaa9a64da424467939ae3bf
SHA1eb83f715bceeafcdca00eb5777518a67c8c05c97
SHA2564e8c666961a65a45903ea11347bc5f5a23bf74e2895d9d03e3fa966ec8dce7bf
SHA5122ba115da2163f2e297f5cdddc17ef5ff6d051ae741d21247b33a5b8ab5f3bbff4b5bd9743f868d7c6ac59f43431b306b84cc290b523d55dce1210039582b1aed
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
ec4453bd1ac017097184a0d59e81d0d1
SHA19eb38ca3c5b2c9571b67e785b1282c6295c23d15
SHA25698d5ee014b2259cd681dbb1cefdcacb311b243947a3f26fe05d6e3eee7f16d5f
SHA512b05ae2a5d36b6cf50aad3bda5c72bc2edec0c33978f0142a8698723e8122e7cfc1295be892a09df41eb8a0139ef4bd9e2c0751ba67a51bcb18c69704733ff933
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
a48406f349cbb3a871c30d10540232c2
SHA1264680993849477c7c57dfabce25907ecb148290
SHA25654285dd75122fd28bbd0800455a47ebe9708f5be27a2d131bd3dafad7c6eb042
SHA51270c89a57c1a77752dfa0c6b644c349d425fdb5f3ea3e3fd464a5df423498d55e2936e4088392d1eb37f70e79a65ff7b635d39f2d01da6a1e072ddb886bc97315
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
e7348b960c4a80026c0d661dcf3cad2e
SHA16652def34126ca8ab4fe4eed77efb54f4950dd3e
SHA256fcb512ab21c0cca878c5020966061c57fc4a863763404225cbe57b175b3c0c3a
SHA512685ad30a7af05c5e1d296a74dd41c73c7bc4e6ba5e85654d089ef2c662f9ebdfd4f410e963835ef994e352cd365e7c1644ff0f0dce134cfd195677f9b64f0442
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
be10a688b0d1c362c54b9b0e0bdbb762
SHA12d9c73ee22955c7e5a935ad294cb71cd2559708e
SHA256d2c55c3376aa2bb849107a0b66d173e54408983a0164c72281fe524de6910f7b
SHA5129003097c4fa4ce43a2e2e0d7a5bc072a172874dbf128929aea5c36d6d676ac20e8a0a2ae67cfb2af9a539fdbc8d7222a15d6a27206c744fdfe49f47a079f5351
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
71c99fc90a916e69ac00303a658f4fdf
SHA173283e06d113948bda6249b0e4b4087c1347c105
SHA256d42536ee8062eed004f7b9fdcd2e8484998d7f9384debdc966a84ecf5d7a4167
SHA5120dc806e669e566c3d28b0f1af4ab5ea61ab9d0858310e6afe8a0a9ae16fee8aa23e6bd90ac01f2be345ae6a16101cd9c718c66dab754c55a11ca4251dbd61009
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
56c276d00b5964f4e70d78400c00553e
SHA15bd69b3faffe5cc01d3a2eff31839e2c4c9b6dec
SHA256d8cb496cd52aae1230316ab8cf1ce0c15ef86392a5e196a4ad8250923a1ba3d6
SHA5123ed42994e548116fbb295039abeaf74aeb8b3c12d2c72b448d95b522660f2b51a8318c5309ee8b78cf0071c1a647ace39e079102b12f22e679a7e0dd80d219e1
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
9a1e8de9ffaa2f7338d00ce9d846060a
SHA15db6d6c56ea726a1a801114a18fbd011367931ce
SHA2568f08fffb9e377f43847a3019ce2d93737bcb5d21e3791c7801ad79a0139c4478
SHA51228255611266b5716fe6097ec53a757dc49a0b02b1a84edb0ccb2b715f680906b9e3cdc45f3f010f8bcdd2bfc7eef0b03cfd3b252080ebf4e3e23b44e76aabc8c
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
f36925c37eef1d69bb4336d87e75a83a
SHA1bffa8d3973a45ca3fb662087e13969c19c95c664
SHA2568ecf8e7372c9a33c104b9a7a5a2a820c77a94a688f12caef350e3477634dba82
SHA512c523361cc4d66961945cb1b010269d20bf0123efef00f2a8f875bf491fecfe8d918f9d499148dd5ba34ec12a5ccff7fccf66cd199c247a39d98add2f0fc75968
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
3f1fe964ff6052781cae891016451330
SHA106d0d9a70b978956ecf586ca7eb2ab88bae5f1aa
SHA2569284e25623baf1e979b751dd6b074582345526da20d7577f6dc5822c746c5669
SHA5124c25f8d89eb20d85fe435e3721575fee8a83f6192d9085e8b30cb7172f1457ff6865127a07c7b34761b662a22364d0226136f19ebf621ec160c5660b50dba636
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
4b2cd83534c3bec961fdb55a6d217a24
SHA1d6614cedf9f487c1b3d3760be31d4bebe9faadff
SHA2566ba34743bb33d78719e65cb35824e1c6c706e8ba6a6b78aeffd7441424d75b02
SHA512597c280b9f8914bbf700325d5860a51f06b39931860a46d9fa82c67365ca0c5bcabe1f900bd9c274f1a1864852e97f4ad6eee63b4a9876994e10d3062e5e0bc6
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
b1ad9787a3e3d45a12bab1300aaac449
SHA1579b69d363fd8c0e9de0aec097ab030e3ee65cbb
SHA256ced63a1166d4179a2e76dc8e56cefca60744a15fc8bae9b6e2d50ecf9265a360
SHA5122f6a634ebba785c35f2a02b4effddf53259aa21e04a54aa9f4c623886e3c387cd004b9aa4367ad93915545159651b9d9cbf499cb22a16d7a710b707088686450
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
cb8613304922e73b586344aba6278cd6
SHA12d3c9b57c1df778aa9f4441e92b782d90f3cc0bb
SHA2563ddbb2ace6e3afcc2064e8de41bf3de48874d5aca14c244aaf0517a8ce8abe0b
SHA512ad2e9ec0ca1f4e22808093f5296e5660aa296cf781ec4530354e658bafc7fbedf6806453894431146ad77a1cb4039baafd0a3a601282ed0acb1922f5015c576b
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
a8792d377d91ce1ffdd10f63895b49c7
SHA133b4264face67409f74f73f1f4295b8f7fe3aaba
SHA256a6dddbf6bf6741eb552f34d61e069b1c282e3c8db97f1519e34a25f6502501b3
SHA51201df446ca8b407fa061e2cb094ddbbc8dd3c65cc05023c9b6d219d696b44da7865a382f4be521e3fea1bfa9e5f9022975c084f0681312ad84a29d9502c936e1a
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
21deb7bc2331cffe8927570028242fd9
SHA165223158c367599bd727dbfcf4b21c36600c5577
SHA2563e1d687e3ab37866b9beb3f3f2e19b0fa14a326486e8e33f4c9705069486b554
SHA51214efae0d67bcb12fe53779ea7fbe1bc2ec6eeb42863d72a52760549253d1f47c3af900aeabe78f52d94f8c2cf7f30bc59ce63323f98f6be809129ba8d912214d
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
bf1fc50070195882839f5a7aeb0c7e75
SHA1fa9522d94ae07ff634a9857d3828e3b312907077
SHA2563f0a905a785a833a721660302eb013984b945a0143d78edec8c3061438dff7b8
SHA512566f9086b3177805e0d6be88a12c84afe27a442329849e05cc986d2dda357637fa8852c90c5548fadb1c91394fff8580028ae151ded613153f5e2fe1c4f6d4d4
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
b4cedb6b2d8c4577673c2c1cdad9063f
SHA1f2bf8845aeb10915ff64549fb44ec784b1201aea
SHA2564dfaf9613de9d2820f134eab8788f929d834b79dc6d2a52aac68cbeab1006264
SHA5122473fa9acf9c895bb61bae17969348887f9cc920b27e2168793968469a6ad826d60dbb886fd22fed85e5252eecbb18f16f70d727cbd665b7971468c66c62a3b4
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
33e616b1be1c6aa0bd6c079f5314e86f
SHA1143c4fe58ac1c6bc48cc468743bb52e63f2d9277
SHA25654b2e0c8856d55dfc53c132272f6d7997bfca09eb07fa3a55c556b266d50960b
SHA51242d721439d7803e981dc31704a4e67032690f355d3c88cc3dbed40bdf9f1af61127d0f063bfc19cedbc4b9eb870a1d01b08935b9ef848bd8cb8073b75f49d5af
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
memory/188-139-0x0000000000000000-mapping.dmp
-
memory/356-114-0x0000000000000000-mapping.dmp
-
memory/356-190-0x0000000000000000-mapping.dmp
-
memory/484-127-0x0000000000000000-mapping.dmp
-
memory/752-155-0x0000000000000000-mapping.dmp
-
memory/860-198-0x0000000000000000-mapping.dmp
-
memory/1120-159-0x0000000000000000-mapping.dmp
-
memory/1128-115-0x0000000000000000-mapping.dmp
-
memory/1296-171-0x0000000000000000-mapping.dmp
-
memory/1400-135-0x0000000000000000-mapping.dmp
-
memory/1496-151-0x0000000000000000-mapping.dmp
-
memory/1504-194-0x0000000000000000-mapping.dmp
-
memory/1664-203-0x0000000000000000-mapping.dmp
-
memory/1828-182-0x0000000000000000-mapping.dmp
-
memory/1888-178-0x0000000000000000-mapping.dmp
-
memory/2020-163-0x0000000000000000-mapping.dmp
-
memory/2208-143-0x0000000000000000-mapping.dmp
-
memory/2332-131-0x0000000000000000-mapping.dmp
-
memory/2332-201-0x0000000000000000-mapping.dmp
-
memory/2660-204-0x0000000000000000-mapping.dmp
-
memory/3120-147-0x0000000000000000-mapping.dmp
-
memory/3184-186-0x0000000000000000-mapping.dmp
-
memory/3208-167-0x0000000000000000-mapping.dmp
-
memory/3516-206-0x0000000000000000-mapping.dmp
-
memory/3568-205-0x0000000000000000-mapping.dmp
-
memory/3684-202-0x0000000000000000-mapping.dmp
-
memory/3708-207-0x0000000000000000-mapping.dmp
-
memory/3888-123-0x0000000000000000-mapping.dmp
-
memory/3968-119-0x0000000000000000-mapping.dmp
-
memory/3968-174-0x0000000000000000-mapping.dmp