Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-05-2021 11:51
Static task
static1
Behavioral task
behavioral1
Sample
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe
Resource
win10v20210408
General
-
Target
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe
-
Size
643KB
-
MD5
963f1309199615322d727f1439aef5cc
-
SHA1
04e53b689c909a344236c455c938dea5fa5f4e18
-
SHA256
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d
-
SHA512
e8d017683ef40c77142469e27fc8daf8c09fb278a9ce826ae71e765e087dde8162ea0127ddf6426eb2c96a44aecc40984e07ed497770aef79ab179d3fa9df2d3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Modifies system executable filetype association 2 TTPs 29 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Drops file in Drivers directory 60 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File created C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx C:\Windows\SysWOW64\drivers\spools.exe upx C:\Users\Admin\Local Settings\Application Data\cftmon.exe upx -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process File opened (read-only) \??\X: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\H: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\G: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\X: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\V: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\O: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\K: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\N: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\G: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\J: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\E: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\J: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\K: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\Q: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\W: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\S: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\M: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\H: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\H: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\K: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\U: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\I: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\E: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\J: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\W: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\Q: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\N: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\Q: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\L: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\U: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\Q: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\E: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\S: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\X: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\M: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\W: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\Q: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\T: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\W: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\N: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\L: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\S: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\T: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\K: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\L: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\G: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\E: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\J: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\O: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\T: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\O: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\T: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\O: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\P: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\F: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\V: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\N: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\J: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\W: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\K: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\H: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\N: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\Q: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe File opened (read-only) \??\G: a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Modifies registry class 29 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exepid process 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2600 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2600 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2616 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2616 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2084 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2084 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 1412 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 1412 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3732 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3732 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 4056 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 4056 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2740 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2740 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 820 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 820 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 1296 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 1296 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2172 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2172 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2264 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2264 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3936 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3936 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3696 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3696 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 184 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 184 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 1128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 1128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2208 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2208 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2096 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2096 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2236 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2236 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3088 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3088 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2840 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2840 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3632 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3632 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2712 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2712 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 188 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 188 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2560 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 2560 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3708 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe 3708 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exea0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exedescription pid process target process PID 776 wrote to memory of 4020 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe reg.exe PID 776 wrote to memory of 4020 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe reg.exe PID 776 wrote to memory of 4020 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe reg.exe PID 776 wrote to memory of 2600 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 776 wrote to memory of 2600 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 776 wrote to memory of 2600 776 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2600 wrote to memory of 2616 2600 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2600 wrote to memory of 2616 2600 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2600 wrote to memory of 2616 2600 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2616 wrote to memory of 2084 2616 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2616 wrote to memory of 2084 2616 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2616 wrote to memory of 2084 2616 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2084 wrote to memory of 1412 2084 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2084 wrote to memory of 1412 2084 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2084 wrote to memory of 1412 2084 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1412 wrote to memory of 3732 1412 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1412 wrote to memory of 3732 1412 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1412 wrote to memory of 3732 1412 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3732 wrote to memory of 4056 3732 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3732 wrote to memory of 4056 3732 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3732 wrote to memory of 4056 3732 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 4056 wrote to memory of 2128 4056 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 4056 wrote to memory of 2128 4056 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 4056 wrote to memory of 2128 4056 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2128 wrote to memory of 2740 2128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2128 wrote to memory of 2740 2128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2128 wrote to memory of 2740 2128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2740 wrote to memory of 820 2740 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2740 wrote to memory of 820 2740 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2740 wrote to memory of 820 2740 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 820 wrote to memory of 1296 820 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 820 wrote to memory of 1296 820 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 820 wrote to memory of 1296 820 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1296 wrote to memory of 2172 1296 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1296 wrote to memory of 2172 1296 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1296 wrote to memory of 2172 1296 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2172 wrote to memory of 2264 2172 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2172 wrote to memory of 2264 2172 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2172 wrote to memory of 2264 2172 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2264 wrote to memory of 3936 2264 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2264 wrote to memory of 3936 2264 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2264 wrote to memory of 3936 2264 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3936 wrote to memory of 3696 3936 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3936 wrote to memory of 3696 3936 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3936 wrote to memory of 3696 3936 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3696 wrote to memory of 184 3696 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3696 wrote to memory of 184 3696 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 3696 wrote to memory of 184 3696 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 184 wrote to memory of 1128 184 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 184 wrote to memory of 1128 184 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 184 wrote to memory of 1128 184 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1128 wrote to memory of 2208 1128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1128 wrote to memory of 2208 1128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 1128 wrote to memory of 2208 1128 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2208 wrote to memory of 2192 2208 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2208 wrote to memory of 2192 2208 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2208 wrote to memory of 2192 2208 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2192 wrote to memory of 2096 2192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2192 wrote to memory of 2096 2192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2192 wrote to memory of 2096 2192 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2096 wrote to memory of 2236 2096 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2096 wrote to memory of 2236 2096 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2096 wrote to memory of 2236 2096 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe PID 2236 wrote to memory of 3088 2236 a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe"C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe2⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe3⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe4⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe5⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe6⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe7⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe8⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe9⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe10⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe11⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe12⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe13⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe14⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe15⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe16⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe17⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe18⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe19⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe20⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe21⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe22⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe23⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe24⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe25⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe26⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe27⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe28⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe29⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exeC:\Users\Admin\AppData\Local\Temp\a0599336cb5861d9aab6a544ab05399c9c842eb0db071b53f2149fb5f971272d.exe30⤵
- Drops file in Drivers directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
6177458fa8589d2a2d44e76570ecbf74
SHA1fdf2b8362e89d2d632e589d0a5fb1540bc5b84c7
SHA25645dddba288bb467c48f750908e6ad03dcc9c7f50baa6e9b06755f7aa121a4316
SHA51278d83033ba76b9ef1adf6e3957b2a0a5cca15feec198a3b0962b4a6c783fe9c865ead3ac4c82ab10fdad5176456b8287560baaf7d61e07e088f554ab380da1e0
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
2334008244942ad5d1b90c80c5d87e4c
SHA130dab7a4c196e9df4b0ec69cc7ea914d199950bf
SHA2568ef5043e0786a186ef99a964f68cbcde01f97eb9b3ee0f2187df1508f1563815
SHA5128acf69e4d0a2b4c7efc72ef726ef7f6f646956f9b5efdcf00d219f6f5f54c77f3ca7efe028b1bee0929e8eb077e7207f417a16ff4970e2c65afee8d2cfc29c28
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
804017c1b8e58dbf73ede1624630a70f
SHA155663766cb312fa5b2cbfb378bbb600e7db83d27
SHA256d3895a7586437cbf3cdd233b10404e855ef4568f85da4d6000f91ca9569a649e
SHA5128e033ede465b3d3153aa11fb3dd7e8a6f17666b2d6af129cacccc230f3af9894c54218fb567189a83558cbd4954dd9f25f78a0c23b57d719a99ed8a25a625f8a
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
c157e191e86e9fdd37e78055cdc3b69b
SHA17b4b3a7683c54b8b804b315c767af68fd42c9237
SHA256eaf96d5b900cd816cd0ffb0e5405c36701b58a6b3d91ab722d94221c241288b3
SHA51214cfd3f8c160858a0ebb9ba487b91aa08226dccd6daa169801b551cd7975c74f45c0f4c29b085dba32ea74f0b3cfe22b3202a6bee4915d5a4c8d318b5bdb5ded
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Users\Admin\Local Settings\Application Data\cftmon.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
289880694609646e35bbdfbbecdedc7d
SHA1fd25361c8fd12cc5b7cb57cb843ce5f64bb10126
SHA256c5c968d91c81d062960c31a554f0e2d7f30360e3d30d4d63317820d3845e0841
SHA512a477f3f8c988b317a39154da7d4cee846d98e563fd119b6a8f3c0deb97241c27e1549d7834724450f5b9e8114d5876f9fcaaf60d1dfe99590aa744dabba977cd
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
f76e55d86f1de49cb373f9191bd87dea
SHA10df4fa7a00316e4dcb03d7d512af7bc1bb2b0a74
SHA25634c210328741d6dcd3f63590c2ae2a6eceef1dd89c67494cc0ee38967a623719
SHA512a287f221f14ad309317930dc0d0b3a7da11d995e45f5050ca030fd3524d728d9f51d8847f110007d63a6c389e70d1ccf8a601a0573eed3462a2e8375b4b59eac
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
38d1b3bbb343104c4ae2d4c9604effd2
SHA137054cd1f1f7684a288bb45d2d98135b1fb3f003
SHA256a3f7382992b7d4683fbe88b990a90edcb7c66108abe0c722a68f5026888f5e00
SHA51257fd6bf8f6407ee473b7ae48bd18a24c1d85041bacc2f6b0604388fdeff17e0a40ee4d1fbe79988ea3bda59fdfd1d059fd647f2d432f81b537a541a246eae725
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
e00abafd39f0a7f9dc6f14b57a4b8e11
SHA1ea4c70ac1de39319abfaa9aa257f629f8c920ef8
SHA2562e430e9481dbcaefb628837d842656ceb8373eb23c0070cc627e2ff8279ac435
SHA512bf0454650bfe887f6c5b328c89e49632d9cffe915cb634e59d27f1274d103f756f4f5c5da8fb2dd58391ec1d7853b54988d2adb3409282c8534d21c8213a1dc8
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
44315ffd86b1a3466cf3d579a97bbace
SHA1b6ad4401cbaa37ceca147eb6889603c7158fe234
SHA25610ee8738a438a37dd07c60179219b4cfa23b6cbef3fba4c9e9722ace0cc69d65
SHA512da0dadf1cee494551795f08a60f915ed5f12b9406ea122f96cdafb49139dd79552a1c0172b317407e0e3fe7dc8b4bddf3ec032537a188b62b2451e14dd57effa
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
2a1bebc5216b3c30c8573d554f5fc5b6
SHA1df291c562ee0d74677c2e30d0c15c8837441aa1f
SHA256f82d7ad2a0e3191df3878b3a7fa84ebe05dc504709a712bf2984ecd797dcdbcf
SHA512bada5240af0949c162eb8137c3e581211e96926d85d6ae8f3a20841349a03c685ef81bcafc33bca202d3a09398f246388d7c61d3fa546bcac00417f337ea37ba
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
28152ae1ce466ec0f52e0793dd676573
SHA130578998ae3615269def0e5bdb341a47b0bb2864
SHA256f03db750dd5018bcc2623d73c08ec93cca5b83037e61f1d390f3582505ad0b52
SHA5128051cddbca8dfee91eab74b89a2402ac14d75b19a471ba1fb13fcfd0c00c4a0b3709a2abf8a4d9e9eb545eea7bd8fe918720aa6062098720e361cb81feba3aa4
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
4ecdad2788acb6980ac877b8a6078c47
SHA1e6ddd2121db92aaa41f14c604ccc75d0daaa3609
SHA2565eed7dccd946c93ed5536fe690aa70257bd909bdaca1746d8733c00c994301c9
SHA512472bc27f6e161597be5ba4f702ee2c7068b947cd7f8eec7ba8a0057463e841456dba2d378b4bd416a76a7f1b41ad93381fc154ea01237f0db1045c550530d64f
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
2edda8211d03882a57e3a6219b6d76e5
SHA1974ac5fdf8a60cd26b6dda948838021fe0a9c06f
SHA256a2e0bcbe13a827d331aeda94eabd97bf48b5e7cf1d3eb8b58929c9b17d3c8e51
SHA512c6f4c4b523cebe19019d70acad97faf87a23ea3411c3c69876e6318eecbadb6ca8065b48ce837a2bc909f1f3b8cce59668ced5d0939347486cf7c681f41f9684
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
836767136d5d3bddc565ba08e517e667
SHA1de2924f68433855b33a45265768970e0c233c5b4
SHA256f82859242e9502248d5bca6468f933c6a33944aa7872c3275c2a3e9573bc438c
SHA512e2fff9aa30f1591d44c648e7fb4262cb0fbd53a91a682385ab697bb959576400ca7b16dd93654765eb85f668257204efebd21e17f48b35a39f0e5c8d772eb28e
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
ed62ff87390a40acb2f04707f45fb8f4
SHA1f239320f59760ba3b022d1cd4c5e1acaff9d8202
SHA2567d5d86c9f85f4b0678ca389420e7fdc8e3becada86da328929fee075385b28a4
SHA512f6463fc7b091e2f3c1409acabe641887c83c3e4118c07442fb9ddd7411403cd5a55b4d6092b585ca8d20d46061b6df05c9be8e548f47357d45696abf614e9031
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
46302cdca856594fdbc8bc626840afd3
SHA1d39187e45f02ae1a800c7868e5159464a61bac8c
SHA2560115f616767e015ea5a270eed93b095cfd46c32c156b7a9f88bd77fc79c145ec
SHA512807b969f4b0438503203d035af59257a7c2b5a0511b52ca3f4596ef48fac24650512722e8570de8d359dab78625ea64f45d395918aa9983b246d625abb32300e
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
5f015ba9b82dea5b51b1c1d11fabcc61
SHA16d08629ef84fad8e5e40d188c70b39e42d8895c0
SHA2565263584ddb39d03dcced6122b0b0ecd62cd01152d712f584c3bad4215b613e54
SHA512acd41d310d36fbb4af3374fd734f27d9c12c44fc582389b46faf0c93338a30e4a57d3cc569433d84364c64ea6ce6545561bd84769204b797074dc0770309d711
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
1cb6ca0eb2ffa30c95b358fa277fbc3c
SHA176ca55a9f20ac16268d14e0fef71cff29609e6af
SHA2566a3a5a57c815098f244e1cf9af8c018287e55a4336e4681ce54af4945fc5f0ae
SHA512bda1c92e2d1b278e4ee1d99d0dae4aa0c32daa33d16579a902a4900f7727384c683581527798e09150092a5a48d4b3827877824be3099b24107195f719e240c0
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
53e8e89fa7cd6bc43d45479591b2b4cc
SHA123abd3c3789c5822a155b5d3a173fcd52c2b2ab7
SHA256185f5d5304aec08da31a1a1c635df5d52915fe0f4d35bac59a840760919e4ee7
SHA5128023fbe6b0b82cbec57f3288b58b9e56020de7107d1b793fae6cf250bb04fdfe4fcb425efbf8e172231df3dbe3992110d27c5998b65e2a1e78564cf762851a7e
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
a72c15acaa4272d0c965be981ec79049
SHA1b632d6cf7400fdbdfb6ae98800a519bcb95ee763
SHA2565dfb56333b498bfae546443fc4abab0f367419d716b04a6ff5199516a98c30ce
SHA512b4ccf55a69c6fac7a40b2d0f4228629e728c215f5229f2d191c1b941b792901841bac7081e12c3a662d87429ec125fbfc9e55163c0c2ddb9ee8c35e4dbba5c19
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
c9149dd6785c445b9fa88e5f6d3119af
SHA186feebf7ff2c64c57d61ace49216047d82da3dae
SHA256ccfb23e33454db6da887fcc27bdfe79a01e342abbdcac2463b605ef4dcae355c
SHA5129cd24f2366bb3cd99f8da0383976909c0c363fdc59703844ce5da603e62e20a3b2d17ee56a356876ddfc0118d146b6619fb96df672828d4a354a0ee04c5bde5e
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
dcc460abcf46cacaacfe2a34c590cdd8
SHA190814420801a3876ea4e9563b2e24c91658922e1
SHA2564aa58df87c6465a2086038e380eb2cf069db96e65807b78358ee7b87655f0a29
SHA512c36a93353c0f6fe038b7a13f64e7fdcbb976ae6d1852f9bfeecde81703e47a6a383f0400c6d1d077c735c85899258952e8dd7893026b6a2f96b1d10d9db43351
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
985b95b1da2fbf467723646a87929028
SHA15be854899e154228b83a70bb14df77e986f67a4d
SHA256210b2295c430ad4f8a7b0bcff83088de4c459773be67c0444d6e0894c8363178
SHA51245720401327b9b32cdea3a7d84edaace137c2033b2d957abaedfa1cad58edfac248da9c68ac12945b1daa6574a66f5d13dd096313544b1c4f735c6d4d5c8a087
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
64080a7a6f38536e775e1c6bfdb2ad4c
SHA1ea8ed92642227427b66d5e2fa43c76690b93180e
SHA25692889068f88bb402121d3f072a9bd588b887540f0a23e655bb784c94733ab99a
SHA512bd66f674f686706d74d997a459292eb1009d0cef2bc7c6c0a64872a2ee3fe89e0b47eb0e52c3c9053e9697daac09c050c19e7382129cb4b7bf6e2e135a8ed401
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
f9471f60c8debcf6d1fca8e620e24b71
SHA1dcd01d6c5367b9a6d16d464df3b0d2a095f02333
SHA256a8d881d0c8744ebbe99dc0a97463e0c7a1012a85c0a5e47b2fa11a63f711fa0c
SHA5125a8805b9f39827cb3d7b658ccbc05e4ba8d720461f2c0a23510bdb58322eb585ff493556a932de9eef0dccb6de0b467411e674b57fe9e1fdf83e222fb18b2bb9
-
C:\Windows\SysWOW64\drivers\spools.exeMD5
14d60bef944347c099d02cf58697f1f8
SHA198a8c8b57650035ccc513f4a8139591b4ced1370
SHA2564a69699632266ae37affbee1659ad9aeec12287ac2839645bd1cf5678cde1d1f
SHA51275b82e3e00f5b8b1f86881737ed80148be7609317770991256da29c3f98e1d67eebd8ac16cc6c2f1bb73899c493caf3dcdc02a00e529b71d27dab26d84280aeb
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
\??\c:\stopMD5
c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
memory/184-171-0x0000000000000000-mapping.dmp
-
memory/188-204-0x0000000000000000-mapping.dmp
-
memory/820-147-0x0000000000000000-mapping.dmp
-
memory/1128-175-0x0000000000000000-mapping.dmp
-
memory/1296-151-0x0000000000000000-mapping.dmp
-
memory/1412-127-0x0000000000000000-mapping.dmp
-
memory/2084-123-0x0000000000000000-mapping.dmp
-
memory/2096-186-0x0000000000000000-mapping.dmp
-
memory/2128-139-0x0000000000000000-mapping.dmp
-
memory/2172-155-0x0000000000000000-mapping.dmp
-
memory/2192-182-0x0000000000000000-mapping.dmp
-
memory/2208-207-0x0000000000000000-mapping.dmp
-
memory/2208-179-0x0000000000000000-mapping.dmp
-
memory/2236-190-0x0000000000000000-mapping.dmp
-
memory/2264-159-0x0000000000000000-mapping.dmp
-
memory/2560-205-0x0000000000000000-mapping.dmp
-
memory/2600-115-0x0000000000000000-mapping.dmp
-
memory/2616-119-0x0000000000000000-mapping.dmp
-
memory/2712-203-0x0000000000000000-mapping.dmp
-
memory/2740-143-0x0000000000000000-mapping.dmp
-
memory/2840-201-0x0000000000000000-mapping.dmp
-
memory/3088-193-0x0000000000000000-mapping.dmp
-
memory/3192-197-0x0000000000000000-mapping.dmp
-
memory/3632-202-0x0000000000000000-mapping.dmp
-
memory/3696-167-0x0000000000000000-mapping.dmp
-
memory/3708-206-0x0000000000000000-mapping.dmp
-
memory/3732-131-0x0000000000000000-mapping.dmp
-
memory/3936-163-0x0000000000000000-mapping.dmp
-
memory/4020-114-0x0000000000000000-mapping.dmp
-
memory/4056-135-0x0000000000000000-mapping.dmp