Analysis
-
max time kernel
151s -
max time network
133s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
05-05-2021 11:08
Static task
static1
Behavioral task
behavioral1
Sample
aa625b84_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
aa625b84_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
aa625b84_by_Libranalysis.exe
-
Size
534KB
-
MD5
aa625b8479b7874ae21cfce7f0bd6de1
-
SHA1
f5906108c38dd0ff1a5f846f80cbc648f03e5f0a
-
SHA256
5f32ef9a224027930381255b1ff7d6be7af83f4886006243effeee31ec775b6e
-
SHA512
3d047f66aff1786cce70dd8f465e0332a329d2e50c47fa63dab56a81923c3e19f6e536bfdef1d0f978b9ab41043e4aa836a54734e1a569577c58cd35065b7f82
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
aa625b84_by_Libranalysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\mGYgsQMA\\gqwQksoU.exe," aa625b84_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\mGYgsQMA\\gqwQksoU.exe," aa625b84_by_Libranalysis.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
KQwEksYA.exegqwQksoU.exeQwMgIcgc.exepid process 1332 KQwEksYA.exe 1360 gqwQksoU.exe 2020 QwMgIcgc.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
gqwQksoU.exedescription ioc process File created C:\Users\Admin\Pictures\PushRedo.png.exe gqwQksoU.exe File created C:\Users\Admin\Pictures\RegisterRead.png.exe gqwQksoU.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
gqwQksoU.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International\Geo\Nation gqwQksoU.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1376 cmd.exe -
Loads dropped DLL 16 IoCs
Processes:
aa625b84_by_Libranalysis.exegqwQksoU.exepid process 1840 aa625b84_by_Libranalysis.exe 1840 aa625b84_by_Libranalysis.exe 1840 aa625b84_by_Libranalysis.exe 1840 aa625b84_by_Libranalysis.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
aa625b84_by_Libranalysis.exeKQwEksYA.exegqwQksoU.exeQwMgIcgc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\KQwEksYA.exe = "C:\\Users\\Admin\\jOwAMAwE\\KQwEksYA.exe" aa625b84_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gqwQksoU.exe = "C:\\ProgramData\\mGYgsQMA\\gqwQksoU.exe" aa625b84_by_Libranalysis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\KQwEksYA.exe = "C:\\Users\\Admin\\jOwAMAwE\\KQwEksYA.exe" KQwEksYA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gqwQksoU.exe = "C:\\ProgramData\\mGYgsQMA\\gqwQksoU.exe" gqwQksoU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gqwQksoU.exe = "C:\\ProgramData\\mGYgsQMA\\gqwQksoU.exe" QwMgIcgc.exe -
Drops file in System32 directory 2 IoCs
Processes:
QwMgIcgc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\jOwAMAwE QwMgIcgc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\jOwAMAwE\KQwEksYA QwMgIcgc.exe -
Drops file in Windows directory 1 IoCs
Processes:
gqwQksoU.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico gqwQksoU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1848 reg.exe 1060 reg.exe 1164 reg.exe 1464 reg.exe 1560 reg.exe 1260 reg.exe 1264 reg.exe 1848 reg.exe 964 reg.exe 1032 reg.exe 1700 reg.exe 916 reg.exe 1848 reg.exe 756 reg.exe 916 reg.exe 1824 reg.exe 952 reg.exe 1572 reg.exe 1656 reg.exe 1468 reg.exe 484 reg.exe 1624 reg.exe 1888 reg.exe 1748 reg.exe 1280 reg.exe 396 reg.exe 1620 reg.exe 1468 reg.exe 1040 reg.exe 1628 reg.exe 828 reg.exe 932 reg.exe 1432 reg.exe 396 reg.exe 1748 reg.exe 1864 reg.exe 396 reg.exe 1368 reg.exe 592 reg.exe 1644 reg.exe 1620 reg.exe 828 reg.exe 1916 reg.exe 964 reg.exe 1664 reg.exe 1732 reg.exe 1700 reg.exe 916 reg.exe 1604 reg.exe 1520 reg.exe 1708 reg.exe 1656 reg.exe 1756 reg.exe 1748 reg.exe 1572 reg.exe 1048 reg.exe 928 reg.exe 1432 reg.exe 1816 reg.exe 1320 reg.exe 1284 reg.exe 820 reg.exe 1604 reg.exe 1644 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
aa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exepid process 1840 aa625b84_by_Libranalysis.exe 1840 aa625b84_by_Libranalysis.exe 1640 aa625b84_by_Libranalysis.exe 1640 aa625b84_by_Libranalysis.exe 932 aa625b84_by_Libranalysis.exe 932 aa625b84_by_Libranalysis.exe 1124 aa625b84_by_Libranalysis.exe 1124 aa625b84_by_Libranalysis.exe 1392 aa625b84_by_Libranalysis.exe 1392 aa625b84_by_Libranalysis.exe 1060 aa625b84_by_Libranalysis.exe 1060 aa625b84_by_Libranalysis.exe 272 aa625b84_by_Libranalysis.exe 272 aa625b84_by_Libranalysis.exe 828 aa625b84_by_Libranalysis.exe 828 aa625b84_by_Libranalysis.exe 1824 aa625b84_by_Libranalysis.exe 1824 aa625b84_by_Libranalysis.exe 1708 aa625b84_by_Libranalysis.exe 1708 aa625b84_by_Libranalysis.exe 1280 aa625b84_by_Libranalysis.exe 1280 aa625b84_by_Libranalysis.exe 1680 aa625b84_by_Libranalysis.exe 1680 aa625b84_by_Libranalysis.exe 1876 aa625b84_by_Libranalysis.exe 1876 aa625b84_by_Libranalysis.exe 1628 aa625b84_by_Libranalysis.exe 1628 aa625b84_by_Libranalysis.exe 556 aa625b84_by_Libranalysis.exe 556 aa625b84_by_Libranalysis.exe 1620 aa625b84_by_Libranalysis.exe 1620 aa625b84_by_Libranalysis.exe 1876 aa625b84_by_Libranalysis.exe 1876 aa625b84_by_Libranalysis.exe 752 aa625b84_by_Libranalysis.exe 752 aa625b84_by_Libranalysis.exe 660 aa625b84_by_Libranalysis.exe 660 aa625b84_by_Libranalysis.exe 1876 aa625b84_by_Libranalysis.exe 1876 aa625b84_by_Libranalysis.exe 1560 aa625b84_by_Libranalysis.exe 1560 aa625b84_by_Libranalysis.exe 1208 aa625b84_by_Libranalysis.exe 1208 aa625b84_by_Libranalysis.exe 1260 aa625b84_by_Libranalysis.exe 1260 aa625b84_by_Libranalysis.exe 912 aa625b84_by_Libranalysis.exe 912 aa625b84_by_Libranalysis.exe 1208 aa625b84_by_Libranalysis.exe 1208 aa625b84_by_Libranalysis.exe 1484 aa625b84_by_Libranalysis.exe 1484 aa625b84_by_Libranalysis.exe 1376 aa625b84_by_Libranalysis.exe 1376 aa625b84_by_Libranalysis.exe 1032 aa625b84_by_Libranalysis.exe 1032 aa625b84_by_Libranalysis.exe 1840 aa625b84_by_Libranalysis.exe 1840 aa625b84_by_Libranalysis.exe 944 aa625b84_by_Libranalysis.exe 944 aa625b84_by_Libranalysis.exe 1712 aa625b84_by_Libranalysis.exe 1712 aa625b84_by_Libranalysis.exe 1548 aa625b84_by_Libranalysis.exe 1548 aa625b84_by_Libranalysis.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
gqwQksoU.exepid process 1360 gqwQksoU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
gqwQksoU.exepid process 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe 1360 gqwQksoU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aa625b84_by_Libranalysis.execmd.exeaa625b84_by_Libranalysis.execmd.exeaa625b84_by_Libranalysis.execmd.exedescription pid process target process PID 1840 wrote to memory of 1332 1840 aa625b84_by_Libranalysis.exe KQwEksYA.exe PID 1840 wrote to memory of 1332 1840 aa625b84_by_Libranalysis.exe KQwEksYA.exe PID 1840 wrote to memory of 1332 1840 aa625b84_by_Libranalysis.exe KQwEksYA.exe PID 1840 wrote to memory of 1332 1840 aa625b84_by_Libranalysis.exe KQwEksYA.exe PID 1840 wrote to memory of 1360 1840 aa625b84_by_Libranalysis.exe gqwQksoU.exe PID 1840 wrote to memory of 1360 1840 aa625b84_by_Libranalysis.exe gqwQksoU.exe PID 1840 wrote to memory of 1360 1840 aa625b84_by_Libranalysis.exe gqwQksoU.exe PID 1840 wrote to memory of 1360 1840 aa625b84_by_Libranalysis.exe gqwQksoU.exe PID 1840 wrote to memory of 556 1840 aa625b84_by_Libranalysis.exe cmd.exe PID 1840 wrote to memory of 556 1840 aa625b84_by_Libranalysis.exe cmd.exe PID 1840 wrote to memory of 556 1840 aa625b84_by_Libranalysis.exe cmd.exe PID 1840 wrote to memory of 556 1840 aa625b84_by_Libranalysis.exe cmd.exe PID 1840 wrote to memory of 1600 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1600 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1600 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1600 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1740 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1740 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1740 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1740 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1888 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1888 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1888 1840 aa625b84_by_Libranalysis.exe reg.exe PID 1840 wrote to memory of 1888 1840 aa625b84_by_Libranalysis.exe reg.exe PID 556 wrote to memory of 1640 556 cmd.exe aa625b84_by_Libranalysis.exe PID 556 wrote to memory of 1640 556 cmd.exe aa625b84_by_Libranalysis.exe PID 556 wrote to memory of 1640 556 cmd.exe aa625b84_by_Libranalysis.exe PID 556 wrote to memory of 1640 556 cmd.exe aa625b84_by_Libranalysis.exe PID 1640 wrote to memory of 1656 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1656 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1656 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1656 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1656 wrote to memory of 932 1656 cmd.exe aa625b84_by_Libranalysis.exe PID 1656 wrote to memory of 932 1656 cmd.exe aa625b84_by_Libranalysis.exe PID 1656 wrote to memory of 932 1656 cmd.exe aa625b84_by_Libranalysis.exe PID 1656 wrote to memory of 932 1656 cmd.exe aa625b84_by_Libranalysis.exe PID 1640 wrote to memory of 396 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 396 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 396 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 396 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 1148 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 1148 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 1148 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 1148 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 756 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 756 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 756 1640 aa625b84_by_Libranalysis.exe reg.exe PID 1640 wrote to memory of 756 1640 aa625b84_by_Libranalysis.exe reg.exe PID 932 wrote to memory of 660 932 aa625b84_by_Libranalysis.exe cmd.exe PID 932 wrote to memory of 660 932 aa625b84_by_Libranalysis.exe cmd.exe PID 932 wrote to memory of 660 932 aa625b84_by_Libranalysis.exe cmd.exe PID 932 wrote to memory of 660 932 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1812 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1812 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1812 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 1640 wrote to memory of 1812 1640 aa625b84_by_Libranalysis.exe cmd.exe PID 660 wrote to memory of 1124 660 cmd.exe aa625b84_by_Libranalysis.exe PID 660 wrote to memory of 1124 660 cmd.exe aa625b84_by_Libranalysis.exe PID 660 wrote to memory of 1124 660 cmd.exe aa625b84_by_Libranalysis.exe PID 660 wrote to memory of 1124 660 cmd.exe aa625b84_by_Libranalysis.exe PID 932 wrote to memory of 1620 932 aa625b84_by_Libranalysis.exe reg.exe PID 932 wrote to memory of 1620 932 aa625b84_by_Libranalysis.exe reg.exe PID 932 wrote to memory of 1620 932 aa625b84_by_Libranalysis.exe reg.exe PID 932 wrote to memory of 1620 932 aa625b84_by_Libranalysis.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\jOwAMAwE\KQwEksYA.exe"C:\Users\Admin\jOwAMAwE\KQwEksYA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\mGYgsQMA\gqwQksoU.exe"C:\ProgramData\mGYgsQMA\gqwQksoU.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"8⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"10⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"12⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"14⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"16⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"18⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"20⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis21⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"22⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"24⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis25⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"26⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis27⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"28⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis29⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"30⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"32⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"34⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis35⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"36⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis37⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"38⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis39⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"40⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis41⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"42⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis43⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"44⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis45⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"46⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis47⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"48⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis49⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"50⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis51⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"52⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis53⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"54⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis55⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"56⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis57⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"58⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis59⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"60⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis61⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"62⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis63⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"64⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis65⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"66⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis67⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"68⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis69⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"70⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis71⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"72⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis73⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"74⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis75⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"76⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis77⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"78⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis79⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"80⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis81⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"82⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis83⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"84⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis85⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"86⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis87⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"88⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis89⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"90⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis91⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"92⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis93⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"94⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis95⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"96⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis97⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"98⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis99⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"100⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis101⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"102⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis103⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"104⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis105⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"106⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis107⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"108⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis109⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"110⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis111⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"112⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis113⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"114⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis115⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"116⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis117⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"118⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis119⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"120⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis121⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"122⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis123⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"124⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis125⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"126⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis127⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"128⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1128⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2128⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f128⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wSIgkQYE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""128⤵
- Deletes itself
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2126⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f126⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kOYMssYY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""126⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs127⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1124⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2124⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f124⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JSooAwEc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""124⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs125⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f122⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ekoIIEMA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""122⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1120⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2120⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wOcUUkAY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""120⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs121⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f120⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1118⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2118⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZmQcocEI.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""118⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs119⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f118⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JicsEgwY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""116⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs117⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VowkAMIs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""114⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TmEsoAEs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""112⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OWswcEos.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""110⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jkcssIYE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""108⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kcscQMAU.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""106⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\meAYwEcY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""104⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SqwgwYMY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""102⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kIUsYAMM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""100⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wugwgoco.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""98⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tOYEQAAQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""96⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LoossEgE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""94⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XSgcsYAI.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""92⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XOkUAcww.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""90⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xWkgwkco.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""88⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\yiosUYYQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""86⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\necQYogw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""84⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CkgEooUE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""82⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ScEoEQIM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""80⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dkYYogEA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""78⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eEYUMAso.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""76⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PqogoskE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""74⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BSUswoMw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""72⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GwowkEYc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""70⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JecAIgYY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""68⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zqIIQwAk.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""66⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nMYsEcQs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""64⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pKwwIgUQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""62⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kCwIIgMs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""60⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dMcQUIcY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""58⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FAwksgMk.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""56⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ewgEIEIQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""54⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EoIMwMIM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""52⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dSEAYcsw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""50⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OOYcUgAo.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""48⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZyMAIwkE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""46⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lOQckcUs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""44⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vqEMUMcQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""42⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\agwowcsM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tAgYMAcs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Eucsgkkk.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\aOgkwQQQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\paQkkcYY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""32⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dsokIIcE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""30⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BWAkAEcU.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""28⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nqsAsEkg.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PmAEskso.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""24⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AGgkcYEY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VGEMgYUo.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RkcAMYEw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gUMIsMEQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qkIAEYUo.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""14⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sGAgQUgQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cIcIUoMs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\fMIkUUcc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UeMIkEMA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""6⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jYIYUQog.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""4⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GUIwMIEY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""2⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\ProgramData\XyYgIgog\QwMgIcgc.exeC:\ProgramData\XyYgIgog\QwMgIcgc.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "65011297227614574123594252411324733731765699114-1334892595385521687-400992234"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\XyYgIgog\QwMgIcgc.exeMD5
e08f9db86245c94acc24d4f6ee2910ea
SHA199aca6ac596e6feb29b7a9154ac2ec0b14a6b568
SHA25644f91d8d35cd704774c4887fef3fe625376983041ce4372777006e4611a5134c
SHA512d1c8a7e7bef10e2275ec3dbe4c17eb1dd02e0d95c0ab6db0a6c763831d7ebcf6f315829e5dd69323b59812c3ae4e5bf4636c8ab4030950348f1b02d060729e97
-
C:\ProgramData\mGYgsQMA\gqwQksoU.exeMD5
3251e8d462ca481ac6ab0e014de572c9
SHA154ecbeb1893f495754c244209069b4ce7d53deee
SHA256af35a99e46b41c8be6628d97945044731d4af917afb603c9f9e6a349e42788cb
SHA512410e4d4877998f0f61ca70661fde4e7ec9d31aba16422022d84c9ec14a780de55dedc2703e9978ae51b2a97f6f61b50f8a3fe9c9d6f1cd3d21ddce3580c3cd81
-
C:\Users\Admin\AppData\Local\Temp\AGgkcYEY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\BWAkAEcU.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\GUIwMIEY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\PmAEskso.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\RkcAMYEw.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\UeMIkEMA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\VGEMgYUo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\cIcIUoMs.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\dsokIIcE.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\fMIkUUcc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\gUMIsMEQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\jYIYUQog.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\nqsAsEkg.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\qkIAEYUo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\sGAgQUgQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\jOwAMAwE\KQwEksYA.exeMD5
f8f51c75f4f363338b65e8c349788846
SHA1c39b5b3755035c9d79735c2df8129858f0daddf8
SHA256984d1f5a289f5bb3166e2e6b4fd26d67873c7615375a8bc0f38087b3e99729da
SHA5125dba06b0a1b96525cde7d6946c843333ac331314e7d80db6aafa7abded6e2b863861533e8376cd50b7a4efcc80f3afef64a68a8cf5a48bf410def6171f712f21
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exeMD5
9d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
4d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
4d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exeMD5
c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
\ProgramData\mGYgsQMA\gqwQksoU.exeMD5
3251e8d462ca481ac6ab0e014de572c9
SHA154ecbeb1893f495754c244209069b4ce7d53deee
SHA256af35a99e46b41c8be6628d97945044731d4af917afb603c9f9e6a349e42788cb
SHA512410e4d4877998f0f61ca70661fde4e7ec9d31aba16422022d84c9ec14a780de55dedc2703e9978ae51b2a97f6f61b50f8a3fe9c9d6f1cd3d21ddce3580c3cd81
-
\ProgramData\mGYgsQMA\gqwQksoU.exeMD5
3251e8d462ca481ac6ab0e014de572c9
SHA154ecbeb1893f495754c244209069b4ce7d53deee
SHA256af35a99e46b41c8be6628d97945044731d4af917afb603c9f9e6a349e42788cb
SHA512410e4d4877998f0f61ca70661fde4e7ec9d31aba16422022d84c9ec14a780de55dedc2703e9978ae51b2a97f6f61b50f8a3fe9c9d6f1cd3d21ddce3580c3cd81
-
\Users\Admin\jOwAMAwE\KQwEksYA.exeMD5
f8f51c75f4f363338b65e8c349788846
SHA1c39b5b3755035c9d79735c2df8129858f0daddf8
SHA256984d1f5a289f5bb3166e2e6b4fd26d67873c7615375a8bc0f38087b3e99729da
SHA5125dba06b0a1b96525cde7d6946c843333ac331314e7d80db6aafa7abded6e2b863861533e8376cd50b7a4efcc80f3afef64a68a8cf5a48bf410def6171f712f21
-
\Users\Admin\jOwAMAwE\KQwEksYA.exeMD5
f8f51c75f4f363338b65e8c349788846
SHA1c39b5b3755035c9d79735c2df8129858f0daddf8
SHA256984d1f5a289f5bb3166e2e6b4fd26d67873c7615375a8bc0f38087b3e99729da
SHA5125dba06b0a1b96525cde7d6946c843333ac331314e7d80db6aafa7abded6e2b863861533e8376cd50b7a4efcc80f3afef64a68a8cf5a48bf410def6171f712f21
-
memory/272-134-0x0000000000000000-mapping.dmp
-
memory/272-103-0x0000000000000000-mapping.dmp
-
memory/396-83-0x0000000000000000-mapping.dmp
-
memory/556-73-0x0000000000000000-mapping.dmp
-
memory/608-129-0x0000000000000000-mapping.dmp
-
memory/660-87-0x0000000000000000-mapping.dmp
-
memory/756-117-0x0000000000000000-mapping.dmp
-
memory/756-85-0x0000000000000000-mapping.dmp
-
memory/820-104-0x0000000000000000-mapping.dmp
-
memory/828-150-0x0000000000000000-mapping.dmp
-
memory/832-175-0x0000000000000000-mapping.dmp
-
memory/932-81-0x0000000000000000-mapping.dmp
-
memory/1036-122-0x0000000000000000-mapping.dmp
-
memory/1040-106-0x0000000000000000-mapping.dmp
-
memory/1060-119-0x0000000000000000-mapping.dmp
-
memory/1124-89-0x0000000000000000-mapping.dmp
-
memory/1148-170-0x0000000000000000-mapping.dmp
-
memory/1148-84-0x0000000000000000-mapping.dmp
-
memory/1208-93-0x0000000000000000-mapping.dmp
-
memory/1260-94-0x0000000000000000-mapping.dmp
-
memory/1280-155-0x0000000000000000-mapping.dmp
-
memory/1284-127-0x0000000000000000-mapping.dmp
-
memory/1284-101-0x0000000000000000-mapping.dmp
-
memory/1320-115-0x0000000000000000-mapping.dmp
-
memory/1332-63-0x0000000000000000-mapping.dmp
-
memory/1360-68-0x0000000000000000-mapping.dmp
-
memory/1392-102-0x0000000000000000-mapping.dmp
-
memory/1432-108-0x0000000000000000-mapping.dmp
-
memory/1436-124-0x0000000000000000-mapping.dmp
-
memory/1464-95-0x0000000000000000-mapping.dmp
-
memory/1464-183-0x0000000000000000-mapping.dmp
-
memory/1468-157-0x0000000000000000-mapping.dmp
-
memory/1560-116-0x0000000000000000-mapping.dmp
-
memory/1600-74-0x0000000000000000-mapping.dmp
-
memory/1600-138-0x0000000000000000-mapping.dmp
-
memory/1620-91-0x0000000000000000-mapping.dmp
-
memory/1640-77-0x0000000000000000-mapping.dmp
-
memory/1644-149-0x0000000000000000-mapping.dmp
-
memory/1656-80-0x0000000000000000-mapping.dmp
-
memory/1664-181-0x0000000000000000-mapping.dmp
-
memory/1664-159-0x0000000000000000-mapping.dmp
-
memory/1680-182-0x0000000000000000-mapping.dmp
-
memory/1680-141-0x0000000000000000-mapping.dmp
-
memory/1708-178-0x0000000000000000-mapping.dmp
-
memory/1712-161-0x0000000000000000-mapping.dmp
-
memory/1724-165-0x0000000000000000-mapping.dmp
-
memory/1724-131-0x0000000000000000-mapping.dmp
-
memory/1732-96-0x0000000000000000-mapping.dmp
-
memory/1736-171-0x0000000000000000-mapping.dmp
-
memory/1740-75-0x0000000000000000-mapping.dmp
-
memory/1744-169-0x0000000000000000-mapping.dmp
-
memory/1744-118-0x0000000000000000-mapping.dmp
-
memory/1748-152-0x0000000000000000-mapping.dmp
-
memory/1748-128-0x0000000000000000-mapping.dmp
-
memory/1752-98-0x0000000000000000-mapping.dmp
-
memory/1756-136-0x0000000000000000-mapping.dmp
-
memory/1800-126-0x0000000000000000-mapping.dmp
-
memory/1812-88-0x0000000000000000-mapping.dmp
-
memory/1816-173-0x0000000000000000-mapping.dmp
-
memory/1824-166-0x0000000000000000-mapping.dmp
-
memory/1840-60-0x0000000074D91000-0x0000000074D93000-memory.dmpFilesize
8KB
-
memory/1848-111-0x0000000000000000-mapping.dmp
-
memory/1864-180-0x0000000000000000-mapping.dmp
-
memory/1888-76-0x0000000000000000-mapping.dmp
-
memory/1956-168-0x0000000000000000-mapping.dmp