Analysis
-
max time kernel
154s -
max time network
117s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
05-05-2021 11:07
Static task
static1
Behavioral task
behavioral1
Sample
25fcf7bb_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
25fcf7bb_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
25fcf7bb_by_Libranalysis.exe
-
Size
619KB
-
MD5
25fcf7bb9e23811c5a807700aec0626d
-
SHA1
2b1239f32aaa689c8027a06ba2a8a6225a204b18
-
SHA256
7abb15e03e0b91fac6a00c5cfb60999bc99fbe378a8decc4751c26eda959df9d
-
SHA512
c14f168dc1be45e39f2a4cec46af5781f37db63dbeed23021ae243046009cbae2baaf7be22bfacc20f89f2872f8526ac22f56d9e6d4b4a8d41dd6450d56c5b4c
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
25fcf7bb_by_Libranalysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\uqAwUYwk\\MKAMEQUM.exe," 25fcf7bb_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\uqAwUYwk\\MKAMEQUM.exe," 25fcf7bb_by_Libranalysis.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
nuoggMMg.exeMKAMEQUM.exedqssIIsw.exepid process 1164 nuoggMMg.exe 2012 MKAMEQUM.exe 576 dqssIIsw.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
MKAMEQUM.exedescription ioc process File created C:\Users\Admin\Pictures\LimitUnregister.png.exe MKAMEQUM.exe File created C:\Users\Admin\Pictures\StartSend.png.exe MKAMEQUM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
nuoggMMg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International\Geo\Nation nuoggMMg.exe -
Loads dropped DLL 16 IoCs
Processes:
25fcf7bb_by_Libranalysis.exeMKAMEQUM.exepid process 1348 25fcf7bb_by_Libranalysis.exe 1348 25fcf7bb_by_Libranalysis.exe 1348 25fcf7bb_by_Libranalysis.exe 1348 25fcf7bb_by_Libranalysis.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe 2012 MKAMEQUM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
25fcf7bb_by_Libranalysis.exenuoggMMg.exeMKAMEQUM.exedqssIIsw.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuoggMMg.exe = "C:\\Users\\Admin\\pWggUMgo\\nuoggMMg.exe" 25fcf7bb_by_Libranalysis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuoggMMg.exe = "C:\\Users\\Admin\\pWggUMgo\\nuoggMMg.exe" nuoggMMg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MKAMEQUM.exe = "C:\\ProgramData\\uqAwUYwk\\MKAMEQUM.exe" 25fcf7bb_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MKAMEQUM.exe = "C:\\ProgramData\\uqAwUYwk\\MKAMEQUM.exe" MKAMEQUM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MKAMEQUM.exe = "C:\\ProgramData\\uqAwUYwk\\MKAMEQUM.exe" dqssIIsw.exe -
Processes:
25fcf7bb_by_Libranalysis.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 25fcf7bb_by_Libranalysis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25fcf7bb_by_Libranalysis.exe -
Drops file in System32 directory 2 IoCs
Processes:
dqssIIsw.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\pWggUMgo dqssIIsw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\pWggUMgo\nuoggMMg dqssIIsw.exe -
Drops file in Windows directory 1 IoCs
Processes:
MKAMEQUM.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico MKAMEQUM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 63 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 108 reg.exe 1560 reg.exe 844 reg.exe 1992 reg.exe 272 reg.exe 432 reg.exe 1680 reg.exe 600 reg.exe 1792 reg.exe 956 reg.exe 1852 reg.exe 1132 reg.exe 1560 reg.exe 900 reg.exe 1784 reg.exe 108 reg.exe 1844 reg.exe 1648 reg.exe 632 reg.exe 1740 reg.exe 1748 reg.exe 1060 reg.exe 1560 reg.exe 664 reg.exe 1176 reg.exe 1216 reg.exe 1424 reg.exe 1464 reg.exe 1464 reg.exe 964 reg.exe 1672 reg.exe 1332 reg.exe 1548 reg.exe 808 reg.exe 1048 reg.exe 1912 reg.exe 1940 reg.exe 1156 reg.exe 960 reg.exe 664 reg.exe 384 reg.exe 1364 reg.exe 880 reg.exe 1176 reg.exe 1496 reg.exe 1640 reg.exe 916 reg.exe 620 reg.exe 1048 reg.exe 620 reg.exe 1060 reg.exe 432 reg.exe 836 reg.exe 1916 reg.exe 1984 reg.exe 824 reg.exe 432 reg.exe 836 reg.exe 1728 reg.exe 1040 reg.exe 1600 reg.exe 1536 reg.exe 1820 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.execmd.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.execonhost.exe25fcf7bb_by_Libranalysis.exe25fcf7bb_by_Libranalysis.exenuoggMMg.exepid process 1348 25fcf7bb_by_Libranalysis.exe 1348 25fcf7bb_by_Libranalysis.exe 1344 25fcf7bb_by_Libranalysis.exe 1344 25fcf7bb_by_Libranalysis.exe 1688 25fcf7bb_by_Libranalysis.exe 1688 25fcf7bb_by_Libranalysis.exe 1560 25fcf7bb_by_Libranalysis.exe 1560 25fcf7bb_by_Libranalysis.exe 664 25fcf7bb_by_Libranalysis.exe 664 25fcf7bb_by_Libranalysis.exe 1424 25fcf7bb_by_Libranalysis.exe 1424 25fcf7bb_by_Libranalysis.exe 292 25fcf7bb_by_Libranalysis.exe 292 25fcf7bb_by_Libranalysis.exe 1844 25fcf7bb_by_Libranalysis.exe 1844 25fcf7bb_by_Libranalysis.exe 1652 25fcf7bb_by_Libranalysis.exe 1652 25fcf7bb_by_Libranalysis.exe 1060 25fcf7bb_by_Libranalysis.exe 1060 25fcf7bb_by_Libranalysis.exe 1756 cmd.exe 1756 cmd.exe 1616 25fcf7bb_by_Libranalysis.exe 1616 25fcf7bb_by_Libranalysis.exe 844 25fcf7bb_by_Libranalysis.exe 844 25fcf7bb_by_Libranalysis.exe 1156 25fcf7bb_by_Libranalysis.exe 1156 25fcf7bb_by_Libranalysis.exe 432 432 1864 25fcf7bb_by_Libranalysis.exe 1864 25fcf7bb_by_Libranalysis.exe 1348 25fcf7bb_by_Libranalysis.exe 1348 25fcf7bb_by_Libranalysis.exe 980 25fcf7bb_by_Libranalysis.exe 980 25fcf7bb_by_Libranalysis.exe 1496 conhost.exe 1496 conhost.exe 1792 25fcf7bb_by_Libranalysis.exe 1792 25fcf7bb_by_Libranalysis.exe 1652 25fcf7bb_by_Libranalysis.exe 1652 25fcf7bb_by_Libranalysis.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
nuoggMMg.exepid process 1164 nuoggMMg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
nuoggMMg.exepid process 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe 1164 nuoggMMg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
25fcf7bb_by_Libranalysis.execmd.exe25fcf7bb_by_Libranalysis.execmd.exe25fcf7bb_by_Libranalysis.exedescription pid process target process PID 1348 wrote to memory of 1164 1348 25fcf7bb_by_Libranalysis.exe nuoggMMg.exe PID 1348 wrote to memory of 1164 1348 25fcf7bb_by_Libranalysis.exe nuoggMMg.exe PID 1348 wrote to memory of 1164 1348 25fcf7bb_by_Libranalysis.exe nuoggMMg.exe PID 1348 wrote to memory of 1164 1348 25fcf7bb_by_Libranalysis.exe nuoggMMg.exe PID 1348 wrote to memory of 2012 1348 25fcf7bb_by_Libranalysis.exe MKAMEQUM.exe PID 1348 wrote to memory of 2012 1348 25fcf7bb_by_Libranalysis.exe MKAMEQUM.exe PID 1348 wrote to memory of 2012 1348 25fcf7bb_by_Libranalysis.exe MKAMEQUM.exe PID 1348 wrote to memory of 2012 1348 25fcf7bb_by_Libranalysis.exe MKAMEQUM.exe PID 1348 wrote to memory of 1804 1348 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1348 wrote to memory of 1804 1348 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1348 wrote to memory of 1804 1348 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1348 wrote to memory of 1804 1348 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1804 wrote to memory of 1344 1804 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 1804 wrote to memory of 1344 1804 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 1804 wrote to memory of 1344 1804 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 1804 wrote to memory of 1344 1804 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 1348 wrote to memory of 1740 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1740 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1740 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1740 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 836 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 836 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 836 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 836 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1060 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1060 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1060 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1348 wrote to memory of 1060 1348 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 640 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1344 wrote to memory of 640 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1344 wrote to memory of 640 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1344 wrote to memory of 640 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 640 wrote to memory of 1688 640 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 640 wrote to memory of 1688 640 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 640 wrote to memory of 1688 640 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 640 wrote to memory of 1688 640 cmd.exe 25fcf7bb_by_Libranalysis.exe PID 1344 wrote to memory of 900 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 900 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 900 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 900 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1784 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1784 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1784 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1784 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1852 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1852 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1852 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1852 1344 25fcf7bb_by_Libranalysis.exe reg.exe PID 1344 wrote to memory of 1940 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1344 wrote to memory of 1940 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1344 wrote to memory of 1940 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1344 wrote to memory of 1940 1344 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1688 wrote to memory of 1496 1688 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1688 wrote to memory of 1496 1688 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1688 wrote to memory of 1496 1688 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1688 wrote to memory of 1496 1688 25fcf7bb_by_Libranalysis.exe cmd.exe PID 1688 wrote to memory of 880 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 880 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 880 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 880 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 1332 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 1332 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 1332 1688 25fcf7bb_by_Libranalysis.exe reg.exe PID 1688 wrote to memory of 1332 1688 25fcf7bb_by_Libranalysis.exe reg.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
25fcf7bb_by_Libranalysis.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 25fcf7bb_by_Libranalysis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25fcf7bb_by_Libranalysis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\pWggUMgo\nuoggMMg.exe"C:\Users\Admin\pWggUMgo\nuoggMMg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\ProgramData\uqAwUYwk\MKAMEQUM.exe"C:\ProgramData\uqAwUYwk\MKAMEQUM.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"6⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"8⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"10⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"12⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"14⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"16⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"18⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"20⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis21⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"22⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"24⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis25⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"26⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis27⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"28⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis29⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"30⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"32⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"34⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis35⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"36⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis37⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"38⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis39⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"40⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis41⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis"42⤵
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nCogwcYw.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""42⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XMkQIAQY.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kmAcoYEw.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZiIQwYIg.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IyMowkAw.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QissIYkU.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""32⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\becccsUQ.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""30⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mOoAIsgE.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""28⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qqgwwoEQ.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CiAAcsQY.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""24⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eIoMsUcA.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vQwgYYgU.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nMsgwgME.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TMYwogoA.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jKMkIkEc.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""14⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IeEwEYcY.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UWwsEckA.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KEQkAkoQ.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HEskEYMg.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""6⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QCIUUoIA.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""4⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cEEYoUIA.bat" "C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_Libranalysis.exe""2⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\ProgramData\WckEYgck\dqssIIsw.exeC:\ProgramData\WckEYgck\dqssIIsw.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-6256572451978036698-18019697419647962291782541931550892921434488216-1888963141"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-506588136158723063-209703885-547441833-73809013230798267-966090658-1700251970"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-477396047138071171911304589453226368281548633691-199448634-13312625601125954190"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1664824207-595991976300923837-155911399-505598045-190047210613658480511330701809"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-267301856378032253142833924257507468-128903276120236611691577913260-502294437"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-295002254-1142939438-662161269-1290203722-366177205250177244-11900781341486848179"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "9098946785105795041922929782-588760892893698732-679839561436899462948705348"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1886306856-697512827-102500395055857572968090157-1595483092-57671992-987787492"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "5383622511228816925-128012091212058551041655919250629172-43864366-1478495095"1⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WckEYgck\dqssIIsw.exeMD5
24fc8379dea8278e12cb703474460bc6
SHA1df39aca1b094446cd44f4b8826e97b0d031ec9a9
SHA25636fed087645ef487485ce5ed3501a2a1d9ef371cc96cbd9ab0367a8443455c5a
SHA5123381616e08e7e61d5d15b00738d3d101cafee2c70f00071a5cedf8c02511ef5660267426a51a83da287de6b8b1c1f2c13338a0b843e30ac1d987b6410f60fd92
-
C:\ProgramData\uqAwUYwk\MKAMEQUM.exeMD5
51aa67e67782a4b2a06d0c03d799394c
SHA101fa3cf22939ef103fe74d812c4cca9c986b6e31
SHA256645174bdad6f66025bdb8f947f625654bc84689a63ebcc6af152d0b1d215205b
SHA51275720d4b6a63aa23784259920a97d021f3db06d6a4dadbfac04a1b94a946dbad54c29f75f716839a365cc35ff1c3217955caed8ffcf78249cfcc0c064893ef7e
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\25fcf7bb_by_LibranalysisMD5
ad19aeae3b6e4e7255c35b73bf519b49
SHA13ee1d901db2ed58d61a1c0da2532ef85562ae3fd
SHA256e9acba85eeed608d5deb570026d92d5c2904fa621223818a26383f64ddf8bfe8
SHA512a4c31c2dd8ca1ccfb59c73259f3b0d88fd0f93519f31e091e26748ccdb6e45780b6e2c8d9e0628195ac778480899e8102add43a20577bbf028d24952b24bf541
-
C:\Users\Admin\AppData\Local\Temp\CiAAcsQY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\HEskEYMg.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\IeEwEYcY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\KEQkAkoQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\QCIUUoIA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\TMYwogoA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\UWwsEckA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\becccsUQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\cEEYoUIA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\eIoMsUcA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\jKMkIkEc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\mOoAIsgE.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\nMsgwgME.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\qqgwwoEQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\vQwgYYgU.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\pWggUMgo\nuoggMMg.exeMD5
335cd4d11537fa274ad92b2f757571ff
SHA1c5f3c176a9335d9ec43821e55db273f15401bf9b
SHA2568b43cd8c3f3e2eebea11b47d852083232143f719bc53fd4a93e7d7f29f837c88
SHA512468b323ef50df4fd9fa7a7dd6ec9aa7674c7c4c2c4e87913e27a097ee4724db6cf32778c48bde2f0b200893bcbe896e4d51e3e942991940f7ed7c57c999d5efd
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exeMD5
9d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
4d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
4d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exeMD5
c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
\ProgramData\uqAwUYwk\MKAMEQUM.exeMD5
51aa67e67782a4b2a06d0c03d799394c
SHA101fa3cf22939ef103fe74d812c4cca9c986b6e31
SHA256645174bdad6f66025bdb8f947f625654bc84689a63ebcc6af152d0b1d215205b
SHA51275720d4b6a63aa23784259920a97d021f3db06d6a4dadbfac04a1b94a946dbad54c29f75f716839a365cc35ff1c3217955caed8ffcf78249cfcc0c064893ef7e
-
\ProgramData\uqAwUYwk\MKAMEQUM.exeMD5
51aa67e67782a4b2a06d0c03d799394c
SHA101fa3cf22939ef103fe74d812c4cca9c986b6e31
SHA256645174bdad6f66025bdb8f947f625654bc84689a63ebcc6af152d0b1d215205b
SHA51275720d4b6a63aa23784259920a97d021f3db06d6a4dadbfac04a1b94a946dbad54c29f75f716839a365cc35ff1c3217955caed8ffcf78249cfcc0c064893ef7e
-
\Users\Admin\pWggUMgo\nuoggMMg.exeMD5
335cd4d11537fa274ad92b2f757571ff
SHA1c5f3c176a9335d9ec43821e55db273f15401bf9b
SHA2568b43cd8c3f3e2eebea11b47d852083232143f719bc53fd4a93e7d7f29f837c88
SHA512468b323ef50df4fd9fa7a7dd6ec9aa7674c7c4c2c4e87913e27a097ee4724db6cf32778c48bde2f0b200893bcbe896e4d51e3e942991940f7ed7c57c999d5efd
-
\Users\Admin\pWggUMgo\nuoggMMg.exeMD5
335cd4d11537fa274ad92b2f757571ff
SHA1c5f3c176a9335d9ec43821e55db273f15401bf9b
SHA2568b43cd8c3f3e2eebea11b47d852083232143f719bc53fd4a93e7d7f29f837c88
SHA512468b323ef50df4fd9fa7a7dd6ec9aa7674c7c4c2c4e87913e27a097ee4724db6cf32778c48bde2f0b200893bcbe896e4d51e3e942991940f7ed7c57c999d5efd
-
memory/108-127-0x0000000000000000-mapping.dmp
-
memory/108-105-0x0000000000000000-mapping.dmp
-
memory/272-106-0x0000000000000000-mapping.dmp
-
memory/292-125-0x0000000000000000-mapping.dmp
-
memory/432-128-0x0000000000000000-mapping.dmp
-
memory/432-148-0x0000000000000000-mapping.dmp
-
memory/600-129-0x0000000000000000-mapping.dmp
-
memory/600-150-0x0000000000000000-mapping.dmp
-
memory/640-80-0x0000000000000000-mapping.dmp
-
memory/664-102-0x0000000000000000-mapping.dmp
-
memory/664-180-0x0000000000000000-mapping.dmp
-
memory/808-168-0x0000000000000000-mapping.dmp
-
memory/824-158-0x0000000000000000-mapping.dmp
-
memory/836-77-0x0000000000000000-mapping.dmp
-
memory/836-155-0x0000000000000000-mapping.dmp
-
memory/880-89-0x0000000000000000-mapping.dmp
-
memory/900-83-0x0000000000000000-mapping.dmp
-
memory/988-109-0x0000000000000000-mapping.dmp
-
memory/1040-142-0x0000000000000000-mapping.dmp
-
memory/1048-122-0x0000000000000000-mapping.dmp
-
memory/1060-161-0x0000000000000000-mapping.dmp
-
memory/1060-78-0x0000000000000000-mapping.dmp
-
memory/1064-101-0x0000000000000000-mapping.dmp
-
memory/1072-98-0x0000000000000000-mapping.dmp
-
memory/1164-63-0x0000000000000000-mapping.dmp
-
memory/1216-143-0x0000000000000000-mapping.dmp
-
memory/1332-90-0x0000000000000000-mapping.dmp
-
memory/1344-74-0x0000000000000000-mapping.dmp
-
memory/1348-60-0x00000000762C1000-0x00000000762C3000-memory.dmpFilesize
8KB
-
memory/1364-119-0x0000000000000000-mapping.dmp
-
memory/1384-132-0x0000000000000000-mapping.dmp
-
memory/1424-112-0x0000000000000000-mapping.dmp
-
memory/1424-166-0x0000000000000000-mapping.dmp
-
memory/1496-88-0x0000000000000000-mapping.dmp
-
memory/1544-124-0x0000000000000000-mapping.dmp
-
memory/1548-157-0x0000000000000000-mapping.dmp
-
memory/1560-144-0x0000000000000000-mapping.dmp
-
memory/1560-94-0x0000000000000000-mapping.dmp
-
memory/1640-160-0x0000000000000000-mapping.dmp
-
memory/1640-130-0x0000000000000000-mapping.dmp
-
memory/1648-93-0x0000000000000000-mapping.dmp
-
memory/1652-153-0x0000000000000000-mapping.dmp
-
memory/1680-116-0x0000000000000000-mapping.dmp
-
memory/1688-81-0x0000000000000000-mapping.dmp
-
memory/1720-139-0x0000000000000000-mapping.dmp
-
memory/1728-91-0x0000000000000000-mapping.dmp
-
memory/1728-173-0x0000000000000000-mapping.dmp
-
memory/1740-76-0x0000000000000000-mapping.dmp
-
memory/1748-117-0x0000000000000000-mapping.dmp
-
memory/1756-179-0x0000000000000000-mapping.dmp
-
memory/1784-84-0x0000000000000000-mapping.dmp
-
memory/1792-99-0x0000000000000000-mapping.dmp
-
memory/1804-73-0x0000000000000000-mapping.dmp
-
memory/1844-140-0x0000000000000000-mapping.dmp
-
memory/1844-118-0x0000000000000000-mapping.dmp
-
memory/1852-85-0x0000000000000000-mapping.dmp
-
memory/1852-146-0x0000000000000000-mapping.dmp
-
memory/1852-110-0x0000000000000000-mapping.dmp
-
memory/1868-115-0x0000000000000000-mapping.dmp
-
memory/1912-104-0x0000000000000000-mapping.dmp
-
memory/1916-156-0x0000000000000000-mapping.dmp
-
memory/1940-86-0x0000000000000000-mapping.dmp
-
memory/1940-167-0x0000000000000000-mapping.dmp
-
memory/1992-178-0x0000000000000000-mapping.dmp
-
memory/2012-68-0x0000000000000000-mapping.dmp