Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 11:08
Static task
static1
Behavioral task
behavioral1
Sample
aa625b84_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
aa625b84_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
aa625b84_by_Libranalysis.exe
-
Size
534KB
-
MD5
aa625b8479b7874ae21cfce7f0bd6de1
-
SHA1
f5906108c38dd0ff1a5f846f80cbc648f03e5f0a
-
SHA256
5f32ef9a224027930381255b1ff7d6be7af83f4886006243effeee31ec775b6e
-
SHA512
3d047f66aff1786cce70dd8f465e0332a329d2e50c47fa63dab56a81923c3e19f6e536bfdef1d0f978b9ab41043e4aa836a54734e1a569577c58cd35065b7f82
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
aa625b84_by_Libranalysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\qIUAccIE\\oScMQMYQ.exe," aa625b84_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\qIUAccIE\\oScMQMYQ.exe," aa625b84_by_Libranalysis.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
cSoAgogs.exeoScMQMYQ.exeVMUUkEMc.exepid process 516 cSoAgogs.exe 188 oScMQMYQ.exe 852 VMUUkEMc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oScMQMYQ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation oScMQMYQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
cSoAgogs.exeoScMQMYQ.exeVMUUkEMc.exeaa625b84_by_Libranalysis.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\cSoAgogs.exe = "C:\\Users\\Admin\\DkoIAoAI\\cSoAgogs.exe" cSoAgogs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oScMQMYQ.exe = "C:\\ProgramData\\qIUAccIE\\oScMQMYQ.exe" oScMQMYQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oScMQMYQ.exe = "C:\\ProgramData\\qIUAccIE\\oScMQMYQ.exe" VMUUkEMc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\cSoAgogs.exe = "C:\\Users\\Admin\\DkoIAoAI\\cSoAgogs.exe" aa625b84_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oScMQMYQ.exe = "C:\\ProgramData\\qIUAccIE\\oScMQMYQ.exe" aa625b84_by_Libranalysis.exe -
Processes:
cmd.exeaa625b84_by_Libranalysis.execmd.execmd.execmd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa625b84_by_Libranalysis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aa625b84_by_Libranalysis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 6 IoCs
Processes:
oScMQMYQ.exeVMUUkEMc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\sheOpenJoin.doc oScMQMYQ.exe File opened for modification C:\Windows\SysWOW64\shePopBackup.pptm oScMQMYQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\DkoIAoAI VMUUkEMc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\DkoIAoAI\cSoAgogs VMUUkEMc.exe File created C:\Windows\SysWOW64\shell32.dll.exe oScMQMYQ.exe File opened for modification C:\Windows\SysWOW64\sheFormatOpen.xlsm oScMQMYQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2124 reg.exe 1020 reg.exe 4072 reg.exe 2096 reg.exe 2164 reg.exe 2416 reg.exe 2328 reg.exe 1120 reg.exe 2284 reg.exe 3564 reg.exe 2984 reg.exe 2880 reg.exe 580 reg.exe 3772 reg.exe 900 reg.exe 3868 reg.exe 1732 reg.exe 580 reg.exe 1468 reg.exe 2316 reg.exe 2160 reg.exe 2412 reg.exe 1756 reg.exe 2156 reg.exe 3156 reg.exe 996 reg.exe 3948 reg.exe 2636 reg.exe 4052 reg.exe 3708 reg.exe 2164 reg.exe 2284 reg.exe 3172 reg.exe 1576 reg.exe 4060 reg.exe 2156 reg.exe 2156 reg.exe 3168 reg.exe 2456 reg.exe 3172 reg.exe 3708 reg.exe 2156 reg.exe 3156 reg.exe 1736 reg.exe 2160 reg.exe 2096 reg.exe 496 reg.exe 2636 reg.exe 1588 reg.exe 2460 reg.exe 2424 reg.exe 3172 reg.exe 2316 reg.exe 2508 reg.exe 2760 reg.exe 2344 reg.exe 1908 reg.exe 1824 reg.exe 2436 reg.exe 2352 reg.exe 1588 reg.exe 1456 reg.exe 4008 reg.exe 3644 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
aa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.execmd.execmd.exeConhost.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exeaa625b84_by_Libranalysis.exepid process 4024 aa625b84_by_Libranalysis.exe 4024 aa625b84_by_Libranalysis.exe 4024 aa625b84_by_Libranalysis.exe 4024 aa625b84_by_Libranalysis.exe 2568 aa625b84_by_Libranalysis.exe 2568 aa625b84_by_Libranalysis.exe 2568 aa625b84_by_Libranalysis.exe 2568 aa625b84_by_Libranalysis.exe 1736 aa625b84_by_Libranalysis.exe 1736 aa625b84_by_Libranalysis.exe 1736 aa625b84_by_Libranalysis.exe 1736 aa625b84_by_Libranalysis.exe 2416 aa625b84_by_Libranalysis.exe 2416 aa625b84_by_Libranalysis.exe 2416 aa625b84_by_Libranalysis.exe 2416 aa625b84_by_Libranalysis.exe 408 aa625b84_by_Libranalysis.exe 408 aa625b84_by_Libranalysis.exe 408 aa625b84_by_Libranalysis.exe 408 aa625b84_by_Libranalysis.exe 3904 aa625b84_by_Libranalysis.exe 3904 aa625b84_by_Libranalysis.exe 3904 aa625b84_by_Libranalysis.exe 3904 aa625b84_by_Libranalysis.exe 3108 aa625b84_by_Libranalysis.exe 3108 aa625b84_by_Libranalysis.exe 3108 aa625b84_by_Libranalysis.exe 3108 aa625b84_by_Libranalysis.exe 992 aa625b84_by_Libranalysis.exe 992 aa625b84_by_Libranalysis.exe 992 aa625b84_by_Libranalysis.exe 992 aa625b84_by_Libranalysis.exe 2984 aa625b84_by_Libranalysis.exe 2984 aa625b84_by_Libranalysis.exe 2984 aa625b84_by_Libranalysis.exe 2984 aa625b84_by_Libranalysis.exe 1612 aa625b84_by_Libranalysis.exe 1612 aa625b84_by_Libranalysis.exe 1612 aa625b84_by_Libranalysis.exe 1612 aa625b84_by_Libranalysis.exe 2568 cmd.exe 2568 cmd.exe 2568 cmd.exe 2568 cmd.exe 2096 cmd.exe 2096 cmd.exe 2096 cmd.exe 2096 cmd.exe 1448 Conhost.exe 1448 Conhost.exe 1448 Conhost.exe 1448 Conhost.exe 3116 aa625b84_by_Libranalysis.exe 3116 aa625b84_by_Libranalysis.exe 3116 aa625b84_by_Libranalysis.exe 3116 aa625b84_by_Libranalysis.exe 584 aa625b84_by_Libranalysis.exe 584 aa625b84_by_Libranalysis.exe 584 aa625b84_by_Libranalysis.exe 584 aa625b84_by_Libranalysis.exe 1576 aa625b84_by_Libranalysis.exe 1576 aa625b84_by_Libranalysis.exe 1576 aa625b84_by_Libranalysis.exe 1576 aa625b84_by_Libranalysis.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
oScMQMYQ.exepid process 188 oScMQMYQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
oScMQMYQ.exepid process 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe 188 oScMQMYQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aa625b84_by_Libranalysis.execmd.exeaa625b84_by_Libranalysis.execmd.execmd.exeaa625b84_by_Libranalysis.execmd.execmd.exeaa625b84_by_Libranalysis.exedescription pid process target process PID 4024 wrote to memory of 516 4024 aa625b84_by_Libranalysis.exe cSoAgogs.exe PID 4024 wrote to memory of 516 4024 aa625b84_by_Libranalysis.exe cSoAgogs.exe PID 4024 wrote to memory of 516 4024 aa625b84_by_Libranalysis.exe cSoAgogs.exe PID 4024 wrote to memory of 188 4024 aa625b84_by_Libranalysis.exe oScMQMYQ.exe PID 4024 wrote to memory of 188 4024 aa625b84_by_Libranalysis.exe oScMQMYQ.exe PID 4024 wrote to memory of 188 4024 aa625b84_by_Libranalysis.exe oScMQMYQ.exe PID 4024 wrote to memory of 1376 4024 aa625b84_by_Libranalysis.exe cmd.exe PID 4024 wrote to memory of 1376 4024 aa625b84_by_Libranalysis.exe cmd.exe PID 4024 wrote to memory of 1376 4024 aa625b84_by_Libranalysis.exe cmd.exe PID 4024 wrote to memory of 1736 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1736 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1736 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1864 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1864 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1864 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1588 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1588 4024 aa625b84_by_Libranalysis.exe reg.exe PID 4024 wrote to memory of 1588 4024 aa625b84_by_Libranalysis.exe reg.exe PID 1376 wrote to memory of 2568 1376 cmd.exe aa625b84_by_Libranalysis.exe PID 1376 wrote to memory of 2568 1376 cmd.exe aa625b84_by_Libranalysis.exe PID 1376 wrote to memory of 2568 1376 cmd.exe aa625b84_by_Libranalysis.exe PID 2568 wrote to memory of 3208 2568 aa625b84_by_Libranalysis.exe cmd.exe PID 2568 wrote to memory of 3208 2568 aa625b84_by_Libranalysis.exe cmd.exe PID 2568 wrote to memory of 3208 2568 aa625b84_by_Libranalysis.exe cmd.exe PID 2568 wrote to memory of 2156 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 2156 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 2156 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 2128 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 2128 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 2128 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 1756 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 1756 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 1756 2568 aa625b84_by_Libranalysis.exe reg.exe PID 2568 wrote to memory of 3936 2568 aa625b84_by_Libranalysis.exe cmd.exe PID 2568 wrote to memory of 3936 2568 aa625b84_by_Libranalysis.exe cmd.exe PID 2568 wrote to memory of 3936 2568 aa625b84_by_Libranalysis.exe cmd.exe PID 3208 wrote to memory of 1736 3208 cmd.exe aa625b84_by_Libranalysis.exe PID 3208 wrote to memory of 1736 3208 cmd.exe aa625b84_by_Libranalysis.exe PID 3208 wrote to memory of 1736 3208 cmd.exe aa625b84_by_Libranalysis.exe PID 3936 wrote to memory of 2344 3936 cmd.exe cscript.exe PID 3936 wrote to memory of 2344 3936 cmd.exe cscript.exe PID 3936 wrote to memory of 2344 3936 cmd.exe cscript.exe PID 1736 wrote to memory of 2868 1736 aa625b84_by_Libranalysis.exe cmd.exe PID 1736 wrote to memory of 2868 1736 aa625b84_by_Libranalysis.exe cmd.exe PID 1736 wrote to memory of 2868 1736 aa625b84_by_Libranalysis.exe cmd.exe PID 2868 wrote to memory of 2416 2868 cmd.exe aa625b84_by_Libranalysis.exe PID 2868 wrote to memory of 2416 2868 cmd.exe aa625b84_by_Libranalysis.exe PID 2868 wrote to memory of 2416 2868 cmd.exe aa625b84_by_Libranalysis.exe PID 1736 wrote to memory of 2060 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 2060 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 2060 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 4072 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 4072 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 4072 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 2892 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 2892 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 2892 1736 aa625b84_by_Libranalysis.exe reg.exe PID 1736 wrote to memory of 3832 1736 aa625b84_by_Libranalysis.exe cmd.exe PID 1736 wrote to memory of 3832 1736 aa625b84_by_Libranalysis.exe cmd.exe PID 1736 wrote to memory of 3832 1736 aa625b84_by_Libranalysis.exe cmd.exe PID 3832 wrote to memory of 1456 3832 cmd.exe cscript.exe PID 3832 wrote to memory of 1456 3832 cmd.exe cscript.exe PID 3832 wrote to memory of 1456 3832 cmd.exe cscript.exe PID 2416 wrote to memory of 2760 2416 aa625b84_by_Libranalysis.exe cmd.exe -
System policy modification 1 TTPs 10 IoCs
Processes:
aa625b84_by_Libranalysis.execmd.execmd.execmd.execmd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aa625b84_by_Libranalysis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa625b84_by_Libranalysis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\DkoIAoAI\cSoAgogs.exe"C:\Users\Admin\DkoIAoAI\cSoAgogs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\qIUAccIE\oScMQMYQ.exe"C:\ProgramData\qIUAccIE\oScMQMYQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"8⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"10⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"12⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"14⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"16⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"18⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"20⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis21⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"22⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis23⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"24⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis25⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"26⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis27⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"28⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis29⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"30⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis31⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis33⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"34⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis35⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"36⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis37⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"38⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis39⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"40⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis41⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"42⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis43⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"44⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis45⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"46⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis47⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"48⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis49⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"50⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis51⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"52⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis53⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"54⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis55⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"56⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis57⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"58⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis59⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"60⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis61⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"62⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis63⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"64⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis65⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"66⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis67⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"68⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis69⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"70⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis71⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"72⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis73⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"74⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis75⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"76⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis77⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"78⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis79⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"80⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis81⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"82⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis83⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"84⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"86⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis87⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"88⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis89⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"90⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis91⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"92⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis93⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"94⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis95⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"96⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis97⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"98⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis99⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"100⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis101⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"102⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis103⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"104⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis105⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"106⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis107⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"108⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis109⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"110⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis111⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"112⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis113⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"114⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis115⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"116⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis117⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"118⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis119⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"120⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis121⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"122⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis123⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"124⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis125⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"126⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis127⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis"128⤵
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exeC:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2128⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pukQMoMM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""128⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f128⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1128⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\naQoYQkg.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""126⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs127⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f126⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f124⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FMoEsYMQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""124⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs125⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2124⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1124⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lMgEgkYw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""122⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1122⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FuYwMgsU.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""120⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs121⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f120⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1118⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AokAoIwQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""118⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs119⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f118⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2118⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yMogMUsQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""116⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs117⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QkcskkwE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""114⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OCEYUUEQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""112⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WWswowYs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""110⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CGAAcoAk.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""108⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jCgUosYs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""106⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pKAMkcko.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""104⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BsAEUIAE.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""102⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jSQoYEwc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""100⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lOkcIMQY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""98⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EOsosYsw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""96⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UMssoAIg.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""94⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iUokcwEg.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""92⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uKkIwMAw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""90⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\suEkAMMs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""88⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YOsYcIww.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""86⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FGUoUkEc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""84⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hWAUcEgA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""82⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TYgwQIEc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""80⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bCQQoQgk.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""78⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LkAMgsgs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""76⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uIsYwYUs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""74⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sywwAMEM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""72⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EIIQEYIU.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""70⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UqUEkAwQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""68⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JYcMkMYQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""66⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tyssUMQg.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""64⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FOoUgAIw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""62⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zUUsgYcw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""60⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UGIwgswU.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""58⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eSEAEgwA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""56⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MSIYsAUs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""54⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uWkQssgs.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""52⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pscMkIYQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""50⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV150⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XyIUoIUQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""48⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RcUkswkQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""46⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GssIkoos.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""44⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KywkUkQw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""42⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GAcQIEcQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hOwAEQgw.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LqsQYMgg.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tcYMEwEA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OEgkogAo.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""32⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kYcQEEUo.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""30⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VMAkEQQc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""28⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FkIkUUkQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tEwYcssc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""24⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RkcYcwEQ.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LAUwcMsI.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vMAIkgEc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AwIAIUYU.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YkIgMYgc.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""14⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oGEkgMMY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EEwAkcYY.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JqYMEEQI.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VawsYgUo.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tKUEUIMA.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EeogcIcM.bat" "C:\Users\Admin\AppData\Local\Temp\aa625b84_by_Libranalysis.exe""2⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\ProgramData\JkIEQswQ\VMUUkEMc.exeC:\ProgramData\JkIEQswQ\VMUUkEMc.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\JkIEQswQ\VMUUkEMc.exeMD5
a7920e1c7f13aad7740b3b54c5e967fc
SHA1eade3826c829a901cb28bdf0d02cc3ad2f1f8459
SHA256db7e2a49c4667f2733f3e7207bbe6712cc5e54a20bfc24a533073472eceb330f
SHA51211ef1b223922ef38a340dcb9abf12d0bae13180eb0476478fc1a8f2b361a67dc29af187902680547e4e9035b49708a93e93a9f83a9011129485268785762025a
-
C:\ProgramData\JkIEQswQ\VMUUkEMc.exeMD5
a7920e1c7f13aad7740b3b54c5e967fc
SHA1eade3826c829a901cb28bdf0d02cc3ad2f1f8459
SHA256db7e2a49c4667f2733f3e7207bbe6712cc5e54a20bfc24a533073472eceb330f
SHA51211ef1b223922ef38a340dcb9abf12d0bae13180eb0476478fc1a8f2b361a67dc29af187902680547e4e9035b49708a93e93a9f83a9011129485268785762025a
-
C:\ProgramData\qIUAccIE\oScMQMYQ.exeMD5
4240e1cb61de6ab3f7bcad2c135d0844
SHA1e942034d196a4ff5e1f3b1b8cd1c1347b7eb4c73
SHA256652f56cbcba7a9dd12558c3a11831258eaaa13962c70a4510dff243af1ee00aa
SHA5124c4a82586e006788f1002b122b736752f10d6c1cf2500c9255c0e94e7dad2baa01ee2abd013f5b92346f8d7a3b6bc1d77180e3e08d2a9ea810afca4521870339
-
C:\ProgramData\qIUAccIE\oScMQMYQ.exeMD5
4240e1cb61de6ab3f7bcad2c135d0844
SHA1e942034d196a4ff5e1f3b1b8cd1c1347b7eb4c73
SHA256652f56cbcba7a9dd12558c3a11831258eaaa13962c70a4510dff243af1ee00aa
SHA5124c4a82586e006788f1002b122b736752f10d6c1cf2500c9255c0e94e7dad2baa01ee2abd013f5b92346f8d7a3b6bc1d77180e3e08d2a9ea810afca4521870339
-
C:\Users\Admin\AppData\Local\Temp\AwIAIUYU.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\EEwAkcYY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\FkIkUUkQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\GAcQIEcQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\JqYMEEQI.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\LAUwcMsI.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\LqsQYMgg.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\OEgkogAo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\RkcYcwEQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\VMAkEQQc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\VawsYgUo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\YkIgMYgc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\aa625b84_by_LibranalysisMD5
187048b427556605b452d1a18359bb8b
SHA119fef45d5f94903ac879fc2404490fc796ad1b08
SHA25618d6564632c7a550efbc5db58e500e28c107dcf0cf06171ca765632de44a8a2b
SHA51294c577a08d39e29799ecb60300f910a2797e7ff9b9dba82c8231dbff22a6c83ec8b42bc5d99c3277b28f0ef637aec2b2b25fbe459941088142becb9ca9e74094
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\hOwAEQgw.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\kYcQEEUo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\oGEkgMMY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\tEwYcssc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\tKUEUIMA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\tcYMEwEA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\vMAIkgEc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\DkoIAoAI\cSoAgogs.exeMD5
0c0dac5a5a53da5c398e66e4dfbdc9fb
SHA10c73d6ebd330a9d96be843dd0c1aa55b5f5097cb
SHA256870432d9d70ee8dae02572680de1ba2227859a9085f69d93f4af966f557464b2
SHA512a0688b28182b66d3fd67d96af41e95703132868d90353d9ed8696a734a90783e659cfe59cf489403f073aaa8a3e62b023d920d96669ce9df6934046d5631b734
-
C:\Users\Admin\DkoIAoAI\cSoAgogs.exeMD5
0c0dac5a5a53da5c398e66e4dfbdc9fb
SHA10c73d6ebd330a9d96be843dd0c1aa55b5f5097cb
SHA256870432d9d70ee8dae02572680de1ba2227859a9085f69d93f4af966f557464b2
SHA512a0688b28182b66d3fd67d96af41e95703132868d90353d9ed8696a734a90783e659cfe59cf489403f073aaa8a3e62b023d920d96669ce9df6934046d5631b734
-
memory/64-162-0x0000000000000000-mapping.dmp
-
memory/188-117-0x0000000000000000-mapping.dmp
-
memory/408-153-0x0000000000000000-mapping.dmp
-
memory/516-114-0x0000000000000000-mapping.dmp
-
memory/580-183-0x0000000000000000-mapping.dmp
-
memory/584-207-0x0000000000000000-mapping.dmp
-
memory/584-195-0x0000000000000000-mapping.dmp
-
memory/992-179-0x0000000000000000-mapping.dmp
-
memory/992-205-0x0000000000000000-mapping.dmp
-
memory/1376-122-0x0000000000000000-mapping.dmp
-
memory/1456-145-0x0000000000000000-mapping.dmp
-
memory/1456-161-0x0000000000000000-mapping.dmp
-
memory/1456-188-0x0000000000000000-mapping.dmp
-
memory/1516-175-0x0000000000000000-mapping.dmp
-
memory/1588-125-0x0000000000000000-mapping.dmp
-
memory/1612-199-0x0000000000000000-mapping.dmp
-
memory/1728-198-0x0000000000000000-mapping.dmp
-
memory/1736-151-0x0000000000000000-mapping.dmp
-
memory/1736-123-0x0000000000000000-mapping.dmp
-
memory/1736-133-0x0000000000000000-mapping.dmp
-
memory/1756-131-0x0000000000000000-mapping.dmp
-
memory/1864-124-0x0000000000000000-mapping.dmp
-
memory/1864-185-0x0000000000000000-mapping.dmp
-
memory/1908-201-0x0000000000000000-mapping.dmp
-
memory/2060-140-0x0000000000000000-mapping.dmp
-
memory/2084-158-0x0000000000000000-mapping.dmp
-
memory/2128-130-0x0000000000000000-mapping.dmp
-
memory/2144-178-0x0000000000000000-mapping.dmp
-
memory/2156-170-0x0000000000000000-mapping.dmp
-
memory/2156-129-0x0000000000000000-mapping.dmp
-
memory/2164-180-0x0000000000000000-mapping.dmp
-
memory/2288-167-0x0000000000000000-mapping.dmp
-
memory/2304-150-0x0000000000000000-mapping.dmp
-
memory/2316-190-0x0000000000000000-mapping.dmp
-
memory/2316-152-0x0000000000000000-mapping.dmp
-
memory/2344-135-0x0000000000000000-mapping.dmp
-
memory/2344-189-0x0000000000000000-mapping.dmp
-
memory/2352-187-0x0000000000000000-mapping.dmp
-
memory/2416-139-0x0000000000000000-mapping.dmp
-
memory/2420-203-0x0000000000000000-mapping.dmp
-
memory/2436-182-0x0000000000000000-mapping.dmp
-
memory/2568-126-0x0000000000000000-mapping.dmp
-
memory/2760-147-0x0000000000000000-mapping.dmp
-
memory/2760-200-0x0000000000000000-mapping.dmp
-
memory/2868-138-0x0000000000000000-mapping.dmp
-
memory/2880-171-0x0000000000000000-mapping.dmp
-
memory/2888-165-0x0000000000000000-mapping.dmp
-
memory/2892-142-0x0000000000000000-mapping.dmp
-
memory/2984-169-0x0000000000000000-mapping.dmp
-
memory/2984-181-0x0000000000000000-mapping.dmp
-
memory/2984-193-0x0000000000000000-mapping.dmp
-
memory/3108-172-0x0000000000000000-mapping.dmp
-
memory/3156-149-0x0000000000000000-mapping.dmp
-
memory/3156-173-0x0000000000000000-mapping.dmp
-
memory/3168-160-0x0000000000000000-mapping.dmp
-
memory/3172-191-0x0000000000000000-mapping.dmp
-
memory/3208-128-0x0000000000000000-mapping.dmp
-
memory/3208-155-0x0000000000000000-mapping.dmp
-
memory/3832-143-0x0000000000000000-mapping.dmp
-
memory/3868-163-0x0000000000000000-mapping.dmp
-
memory/3904-159-0x0000000000000000-mapping.dmp
-
memory/3936-132-0x0000000000000000-mapping.dmp
-
memory/4008-202-0x0000000000000000-mapping.dmp
-
memory/4072-141-0x0000000000000000-mapping.dmp