Analysis
-
max time kernel
151s -
max time network
111s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
11-05-2021 12:46
Static task
static1
Behavioral task
behavioral1
Sample
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe
Resource
win10v20210408
General
-
Target
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe
-
Size
532KB
-
MD5
2146eb12d4f3329cb86bb6d297f6c157
-
SHA1
8ad0a576e0f8b3cc3f10d5cf75d9bb6890ded77d
-
SHA256
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb
-
SHA512
d700600c6b41f4231b93b424624292a0cd8106204b00a3c550dab67bee526686a003511508390b3ece947506ea084e9a2cf77e0c84c00edf400f8e67099f39f9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\oCccQYEI\\jWkAYcgU.exe," 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\oCccQYEI\\jWkAYcgU.exe," 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
WQwsAUUI.exejWkAYcgU.exeXyscEIwo.exepid process 1156 WQwsAUUI.exe 2008 jWkAYcgU.exe 1948 XyscEIwo.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
jWkAYcgU.exedescription ioc process File created C:\Users\Admin\Pictures\RenameSearch.png.exe jWkAYcgU.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jWkAYcgU.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International\Geo\Nation jWkAYcgU.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1760 cmd.exe -
Loads dropped DLL 22 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exejWkAYcgU.exepid process 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeWQwsAUUI.exejWkAYcgU.exeXyscEIwo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WQwsAUUI.exe = "C:\\Users\\Admin\\GAgcUkcQ\\WQwsAUUI.exe" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jWkAYcgU.exe = "C:\\ProgramData\\oCccQYEI\\jWkAYcgU.exe" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WQwsAUUI.exe = "C:\\Users\\Admin\\GAgcUkcQ\\WQwsAUUI.exe" WQwsAUUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jWkAYcgU.exe = "C:\\ProgramData\\oCccQYEI\\jWkAYcgU.exe" jWkAYcgU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jWkAYcgU.exe = "C:\\ProgramData\\oCccQYEI\\jWkAYcgU.exe" XyscEIwo.exe -
Processes:
cscript.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.execmd.execscript.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 2 IoCs
Processes:
XyscEIwo.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\GAgcUkcQ\WQwsAUUI XyscEIwo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\GAgcUkcQ XyscEIwo.exe -
Drops file in Windows directory 1 IoCs
Processes:
jWkAYcgU.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico jWkAYcgU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1128 reg.exe 1344 reg.exe 1140 reg.exe 912 reg.exe 936 reg.exe 976 reg.exe 2024 reg.exe 340 reg.exe 1744 reg.exe 2016 reg.exe 1316 reg.exe 948 reg.exe 980 reg.exe 1768 reg.exe 340 reg.exe 1016 reg.exe 2040 reg.exe 1796 reg.exe 552 reg.exe 1208 reg.exe 936 reg.exe 1864 reg.exe 1796 reg.exe 1488 reg.exe 884 reg.exe 1480 reg.exe 1872 reg.exe 1564 reg.exe 2000 reg.exe 1864 reg.exe 2012 reg.exe 1636 reg.exe 980 reg.exe 1592 reg.exe 1160 reg.exe 1624 reg.exe 1588 reg.exe 1800 reg.exe 2036 reg.exe 1280 reg.exe 936 reg.exe 1612 reg.exe 1340 reg.exe 344 reg.exe 1696 reg.exe 1408 reg.exe 1316 reg.exe 884 reg.exe 1744 reg.exe 1140 reg.exe 1388 reg.exe 1016 reg.exe 1788 reg.exe 1716 reg.exe 1280 reg.exe 1388 reg.exe 1760 reg.exe 1160 reg.exe 2036 reg.exe 1268 reg.exe 520 reg.exe 768 reg.exe 1488 reg.exe 1880 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exereg.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execscript.execscript.exereg.exereg.execmd.exereg.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exereg.exereg.exereg.execonhost.execonhost.exereg.exepid process 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1616 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1616 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 816 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 816 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2012 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2012 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1140 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1140 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1608 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1608 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2044 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2044 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2036 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2036 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1588 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1588 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1872 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1872 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1092 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1092 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1340 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1340 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1408 reg.exe 1408 reg.exe 1092 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1092 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1744 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1744 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1748 cscript.exe 1748 cscript.exe 1880 cscript.exe 1880 cscript.exe 1344 reg.exe 1344 reg.exe 1316 reg.exe 1316 reg.exe 2032 cmd.exe 2032 cmd.exe 1092 reg.exe 1092 reg.exe 864 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 864 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2032 reg.exe 2032 reg.exe 1744 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1744 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1648 reg.exe 1648 reg.exe 1588 reg.exe 1588 reg.exe 1744 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1744 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1804 conhost.exe 1804 conhost.exe 1388 conhost.exe 1388 conhost.exe 884 reg.exe 884 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
jWkAYcgU.exepid process 2008 jWkAYcgU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
jWkAYcgU.exepid process 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe 2008 jWkAYcgU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exedescription pid process target process PID 980 wrote to memory of 1156 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe WQwsAUUI.exe PID 980 wrote to memory of 1156 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe WQwsAUUI.exe PID 980 wrote to memory of 1156 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe WQwsAUUI.exe PID 980 wrote to memory of 1156 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe WQwsAUUI.exe PID 980 wrote to memory of 2008 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe jWkAYcgU.exe PID 980 wrote to memory of 2008 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe jWkAYcgU.exe PID 980 wrote to memory of 2008 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe jWkAYcgU.exe PID 980 wrote to memory of 2008 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe jWkAYcgU.exe PID 980 wrote to memory of 1480 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 980 wrote to memory of 1480 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 980 wrote to memory of 1480 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 980 wrote to memory of 1480 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 980 wrote to memory of 1636 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1636 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1636 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1636 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1208 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1208 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1208 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1208 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1744 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1744 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1744 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 980 wrote to memory of 1744 980 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1480 wrote to memory of 1392 1480 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1480 wrote to memory of 1392 1480 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1480 wrote to memory of 1392 1480 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1480 wrote to memory of 1392 1480 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1392 wrote to memory of 892 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1392 wrote to memory of 892 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1392 wrote to memory of 892 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1392 wrote to memory of 892 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 892 wrote to memory of 748 892 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 892 wrote to memory of 748 892 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 892 wrote to memory of 748 892 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 892 wrote to memory of 748 892 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1392 wrote to memory of 936 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 936 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 936 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 936 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1140 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1140 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1140 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1140 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1564 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1564 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1564 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1564 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1392 wrote to memory of 1012 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1392 wrote to memory of 1012 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1392 wrote to memory of 1012 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1392 wrote to memory of 1012 1392 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 748 wrote to memory of 2036 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 748 wrote to memory of 2036 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 748 wrote to memory of 2036 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 748 wrote to memory of 2036 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 748 wrote to memory of 1612 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 748 wrote to memory of 1612 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 748 wrote to memory of 1612 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 748 wrote to memory of 1612 748 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2036 wrote to memory of 1616 2036 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2036 wrote to memory of 1616 2036 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2036 wrote to memory of 1616 2036 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2036 wrote to memory of 1616 2036 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe -
System policy modification 1 TTPs 16 IoCs
Processes:
cmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.execscript.execscript.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.execmd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe"C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\GAgcUkcQ\WQwsAUUI.exe"C:\Users\Admin\GAgcUkcQ\WQwsAUUI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\oCccQYEI\jWkAYcgU.exe"C:\ProgramData\oCccQYEI\jWkAYcgU.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"8⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"10⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"12⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"14⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"16⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"18⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"20⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb21⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"22⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"24⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb25⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"26⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb27⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"28⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb29⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"30⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"32⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb33⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"34⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb35⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"36⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb37⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"38⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb39⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"40⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb41⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"42⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb43⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"44⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb45⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"46⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb47⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"48⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb49⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"50⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb51⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"52⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb53⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"54⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb55⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"56⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb57⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"58⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb59⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"60⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb61⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"62⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb63⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"64⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb65⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"66⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb67⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"68⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb69⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"70⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb71⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"72⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb73⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"74⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb75⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"76⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb77⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"78⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb79⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"80⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb81⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"82⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb83⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"84⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb85⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"86⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb87⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"88⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb89⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"90⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb91⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"92⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb93⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DIUsMogo.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""92⤵
- Deletes itself
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oyAoYIko.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""90⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
- Modifies registry key
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dIcQMgwE.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""88⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hgQUoYEI.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""86⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZWMkMggU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""84⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EakwsEwM.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""82⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TiEYgUUI.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""80⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NuksYEQg.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""78⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EwQcgEEk.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""76⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HIkQAwgs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""74⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JCskwIQU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""72⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\neIkMYkU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""70⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BiAUckEU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""68⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vGMcMEcc.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""66⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sKQAMAUs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""64⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WukcAsUc.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""62⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nisYQMYE.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""60⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UCQUUUgQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""58⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ogcUkEYs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""56⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Lykcoggw.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""54⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CqIYwAcY.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""52⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zeAMkIQk.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""50⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KcMwMwAU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""48⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HqsMEgYs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""46⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\POgwccoU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""44⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zcEQQksM.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""42⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RQMMIwIA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nmkMEMAA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SUAgcscA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mYUMUwgU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IEgYUAos.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""32⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tWIAsQUU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""30⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EUIowgwQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""28⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LqIYsYws.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uesoQYos.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""24⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\yykMgUkI.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ugIkwUQQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qmUkossc.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mWEMIQYs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mQckkEQI.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""14⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jiookEck.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wgkcAAIQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cwokoMsU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uIEQoQgE.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""6⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LWwscckY.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""4⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qmUAEcIc.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""2⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\ProgramData\yMkocIcs\XyscEIwo.exeC:\ProgramData\yMkocIcs\XyscEIwo.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1982683294-1995488095-20538710351628825993141754960-77003762517573437671315786953"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "2129358987-1609021545-1541876499-1631855360-14269137991553503263-8968812592007264197"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "668833882-33036157519205198441900613346-18461590601094826625-2141428595786737625"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "170755592-577718280-1863532628-1524630186-14797002111052675126-74538751-1466696706"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "21197084911279056877-119751337884661912145723246-9969226351510287932450488300"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "10973015201008684500-1698804395574672572-918870766125920896119148306591602928064"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "19944265552068276285-1312697243-13177230081512163787-639536391-998525037-193517206"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "222980157-557303902267148478-181004745812672703761451603227-1920542580848570234"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-143173972017918497276542042431204328178-877850089-881180867250911399-499607309"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "911409964-731915913-1073042834-511280553105378861121267747532226391281040872995"1⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "937833181384831658-20338207591011762522177680454-10311645811948289658-883592207"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1522243564-2119429564-138157565919442221291510766292-45827917618835522951181130694"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1829686638-747101462589552582-1288509241119291589773122192-10190397991025238428"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1370299040-864249290598653961-548336954-2132903602496585481115717797458394045"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1317893571458323234-11609407701286693985-1049283537-1755806075-2103071057-43806100"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "20479680343378367931249092433-700418807-3384393717733902211341570242436019048"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-206890911-872763605-8349952851459242879-19282265561651262021390959904-736712980"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1081105277-1882186894-2029067271805870548-10265229021956193400-1812334231-406678922"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1393835145-848720729-13142918321314811537-1235077158235061025-929998579-1765054256"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "322048729866247103356986642-1625612247469514509276159201620562030-2072897670"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-7190573998002670001376208657-895757614-1390558083-20038493401073570625-1842704943"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-21217493531470043145-529850356-366331769-21245885635958612791592173777-1941976905"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1677335943-19202025351261969696-94710801354760135-1097990361-1835848905-794049780"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "803478324-375714260-11184944492106950471936664054-204451042-595310785-491661896"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1168844326-105720057-1562505303-4473506114589822496554479771663178507-206424416"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-521874967-272592238-1714872655-1390534150-1461468212-311557313342125851-477417423"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-505136121-14422203902016731233-1576083016-1762401526-757893271-1591883976-2093830518"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "6387200821169349588-116579719950190045680671148911361502901897610970-1103245024"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "59456457444672398-69572333635838532-1004509419-224417516-684321411-2014270647"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "66832184718681284321588024844-1202379217-1418043624273186241191154875-768783612"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1664474886-2374255771331168742-78764022525466541-1915086268-400887328542723947"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-148033888517533685451697292869-13229932921356927852078115414728433729-963112619"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "15340336301943966478517528947-1757464268-1459532663110924990419367066401010574949"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-139944092-1561812510933876667-514957012482771371-121214807419228528391513694422"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "114999415-1922420369-721078412109185405719797417518447682041025862599-1215279495"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1895963939-1627571723-1857800173-6442752581328732727777119599-572342754-1589941161"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-904957384-1992334344326031620-21088573871277375229-6656187671772478350-714581713"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1165141342-128218293024003599417788452201789424047-1762314322858108559-523521156"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-467782172-1369279414-1930648157756002398165107867518913319316624057912053081925"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "6213291601163496347-2045252643-116279755690013497242974733171939354903907404"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-519071547-18572584471076463537-2142806429202321210464430465-832771120-1150447614"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2166399071272238180-1415115192228785133789384143-2407847301508100327470057654"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-99688855-11058313821087129648569305692-6718269411668585173-5402765521013760648"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-17112073241807965247136148213915349106391197432352218714292-863430539-433766207"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1211033254-2040087736-2064055982-1161703182-108572551-19179907981429932347-1475476182"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-694543691-125449015-481105926420845131-1022266584-193900149517897990871163534950"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1957478579-15295235671911092737-8000214692045126051-20335917843853342731812567986"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "65507805300625923517412711-5781048972119122193-1284136522187641791677335096"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "185795859520650016-1246652836-2053828152-260644323-7226024871113058209-611364875"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\oCccQYEI\jWkAYcgU.exeMD5
29e3145ed7e1bcb1e15f2942cf3c0b3e
SHA1745a6906ec975a4ff97bb7ef122c16f95cd604da
SHA2563a83e061b741ea55ba33c577afc49615c5ba4f3b3651b9ba76e62eb0ce304aa2
SHA512b33b241a1e85030efe5ef4e5f40eb7a87ed9ddf317034d9f1057af7e2ceac11b1bfe4e303e434b5ef4f3248794ce76a1fccb0065e846e94b761ddf44d804af1c
-
C:\ProgramData\yMkocIcs\XyscEIwo.exeMD5
c7c8eed4ba930282d1e29db32d41ee44
SHA1e635b98e199c57c5ead1ac1682956fa84e9663c7
SHA2563952c50dd2b91fd70601c2a84a5af70c8a996ee18c69e17676cbb07d11967f31
SHA51279a0e7f70fce91e4a9c32dca7ac0230f15ac484f383075566b1bd658869e3d846b89b2590012a0f832f0dd866b547ece208127e03400f32d938e111ef99d2571
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\EUIowgwQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\LWwscckY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\LqIYsYws.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\cwokoMsU.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\jiookEck.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\mQckkEQI.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\mWEMIQYs.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\qmUAEcIc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\qmUkossc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\uIEQoQgE.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\uesoQYos.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\ugIkwUQQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\wgkcAAIQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\yykMgUkI.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\GAgcUkcQ\WQwsAUUI.exeMD5
15fe363831abf1b2d4177c3d02d2f3ac
SHA1d543fea388c3374a458cc1f02d125967dc1829d2
SHA2560aa84bddbcdfd97262d16fab60167039991945dd7fa1cf4213b807b8f79972a9
SHA512c7de730ed48ec1c651882aabcd054a7c430b04c8d7db74f0eaabdab25448ed3d0333335f3d94d32edbb6c96e559d63a6b5f16c9ac78e972679c6fde34a0f90b7
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exeMD5
9d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
4d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
4d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exeMD5
c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exeMD5
2b48f69517044d82e1ee675b1690c08b
SHA183ca22c8a8e9355d2b184c516e58b5400d8343e0
SHA256507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496
SHA51297d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b
-
\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exeMD5
2b48f69517044d82e1ee675b1690c08b
SHA183ca22c8a8e9355d2b184c516e58b5400d8343e0
SHA256507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496
SHA51297d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b
-
\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exeMD5
e9e67cfb6c0c74912d3743176879fc44
SHA1c6b6791a900020abf046e0950b12939d5854c988
SHA256bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c
SHA5129bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec
-
\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exeMD5
e9e67cfb6c0c74912d3743176879fc44
SHA1c6b6791a900020abf046e0950b12939d5854c988
SHA256bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c
SHA5129bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec
-
\ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\VC_redist.x64.exeMD5
caa6e1dcae648ce17bc57a5b7d383cc8
SHA121fd5579a3d001779e5b8b107a326393d35dff4c
SHA25614ad34fa255132c22b234bb4d30fe6cfd231f4947cccdcbbb94eb85e67135d92
SHA512e4a63894895d20d5e455d6e8c9e81256f56f30f35bf8b385be103114d2e20885f3692bb3ec5e51d1a3073a072da5405200e5ed4a35956684bb8b515a20273ccf
-
\ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\VC_redist.x64.exeMD5
caa6e1dcae648ce17bc57a5b7d383cc8
SHA121fd5579a3d001779e5b8b107a326393d35dff4c
SHA25614ad34fa255132c22b234bb4d30fe6cfd231f4947cccdcbbb94eb85e67135d92
SHA512e4a63894895d20d5e455d6e8c9e81256f56f30f35bf8b385be103114d2e20885f3692bb3ec5e51d1a3073a072da5405200e5ed4a35956684bb8b515a20273ccf
-
\ProgramData\oCccQYEI\jWkAYcgU.exeMD5
29e3145ed7e1bcb1e15f2942cf3c0b3e
SHA1745a6906ec975a4ff97bb7ef122c16f95cd604da
SHA2563a83e061b741ea55ba33c577afc49615c5ba4f3b3651b9ba76e62eb0ce304aa2
SHA512b33b241a1e85030efe5ef4e5f40eb7a87ed9ddf317034d9f1057af7e2ceac11b1bfe4e303e434b5ef4f3248794ce76a1fccb0065e846e94b761ddf44d804af1c
-
\ProgramData\oCccQYEI\jWkAYcgU.exeMD5
29e3145ed7e1bcb1e15f2942cf3c0b3e
SHA1745a6906ec975a4ff97bb7ef122c16f95cd604da
SHA2563a83e061b741ea55ba33c577afc49615c5ba4f3b3651b9ba76e62eb0ce304aa2
SHA512b33b241a1e85030efe5ef4e5f40eb7a87ed9ddf317034d9f1057af7e2ceac11b1bfe4e303e434b5ef4f3248794ce76a1fccb0065e846e94b761ddf44d804af1c
-
\Users\Admin\GAgcUkcQ\WQwsAUUI.exeMD5
15fe363831abf1b2d4177c3d02d2f3ac
SHA1d543fea388c3374a458cc1f02d125967dc1829d2
SHA2560aa84bddbcdfd97262d16fab60167039991945dd7fa1cf4213b807b8f79972a9
SHA512c7de730ed48ec1c651882aabcd054a7c430b04c8d7db74f0eaabdab25448ed3d0333335f3d94d32edbb6c96e559d63a6b5f16c9ac78e972679c6fde34a0f90b7
-
\Users\Admin\GAgcUkcQ\WQwsAUUI.exeMD5
15fe363831abf1b2d4177c3d02d2f3ac
SHA1d543fea388c3374a458cc1f02d125967dc1829d2
SHA2560aa84bddbcdfd97262d16fab60167039991945dd7fa1cf4213b807b8f79972a9
SHA512c7de730ed48ec1c651882aabcd054a7c430b04c8d7db74f0eaabdab25448ed3d0333335f3d94d32edbb6c96e559d63a6b5f16c9ac78e972679c6fde34a0f90b7
-
memory/340-112-0x0000000000000000-mapping.dmp
-
memory/340-158-0x0000000000000000-mapping.dmp
-
memory/344-129-0x0000000000000000-mapping.dmp
-
memory/364-135-0x0000000000000000-mapping.dmp
-
memory/600-118-0x0000000000000000-mapping.dmp
-
memory/748-81-0x0000000000000000-mapping.dmp
-
memory/816-101-0x0000000000000000-mapping.dmp
-
memory/864-104-0x0000000000000000-mapping.dmp
-
memory/884-134-0x0000000000000000-mapping.dmp
-
memory/892-80-0x0000000000000000-mapping.dmp
-
memory/936-83-0x0000000000000000-mapping.dmp
-
memory/936-169-0x0000000000000000-mapping.dmp
-
memory/948-166-0x0000000000000000-mapping.dmp
-
memory/976-107-0x0000000000000000-mapping.dmp
-
memory/980-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/1012-86-0x0000000000000000-mapping.dmp
-
memory/1012-175-0x0000000000000000-mapping.dmp
-
memory/1032-130-0x0000000000000000-mapping.dmp
-
memory/1128-171-0x0000000000000000-mapping.dmp
-
memory/1140-84-0x0000000000000000-mapping.dmp
-
memory/1140-180-0x0000000000000000-mapping.dmp
-
memory/1140-133-0x0000000000000000-mapping.dmp
-
memory/1156-63-0x0000000000000000-mapping.dmp
-
memory/1160-121-0x0000000000000000-mapping.dmp
-
memory/1208-75-0x0000000000000000-mapping.dmp
-
memory/1268-183-0x0000000000000000-mapping.dmp
-
memory/1376-145-0x0000000000000000-mapping.dmp
-
memory/1392-77-0x0000000000000000-mapping.dmp
-
memory/1480-73-0x0000000000000000-mapping.dmp
-
memory/1564-85-0x0000000000000000-mapping.dmp
-
memory/1592-177-0x0000000000000000-mapping.dmp
-
memory/1608-156-0x0000000000000000-mapping.dmp
-
memory/1612-90-0x0000000000000000-mapping.dmp
-
memory/1612-124-0x0000000000000000-mapping.dmp
-
memory/1616-91-0x0000000000000000-mapping.dmp
-
memory/1624-142-0x0000000000000000-mapping.dmp
-
memory/1636-74-0x0000000000000000-mapping.dmp
-
memory/1660-155-0x0000000000000000-mapping.dmp
-
memory/1696-162-0x0000000000000000-mapping.dmp
-
memory/1700-96-0x0000000000000000-mapping.dmp
-
memory/1708-159-0x0000000000000000-mapping.dmp
-
memory/1708-98-0x0000000000000000-mapping.dmp
-
memory/1744-76-0x0000000000000000-mapping.dmp
-
memory/1744-170-0x0000000000000000-mapping.dmp
-
memory/1748-184-0x0000000000000000-mapping.dmp
-
memory/1756-120-0x0000000000000000-mapping.dmp
-
memory/1760-181-0x0000000000000000-mapping.dmp
-
memory/1760-92-0x0000000000000000-mapping.dmp
-
memory/1768-131-0x0000000000000000-mapping.dmp
-
memory/1776-164-0x0000000000000000-mapping.dmp
-
memory/1796-109-0x0000000000000000-mapping.dmp
-
memory/1872-122-0x0000000000000000-mapping.dmp
-
memory/1880-114-0x0000000000000000-mapping.dmp
-
memory/1880-173-0x0000000000000000-mapping.dmp
-
memory/1912-102-0x0000000000000000-mapping.dmp
-
memory/2000-93-0x0000000000000000-mapping.dmp
-
memory/2004-94-0x0000000000000000-mapping.dmp
-
memory/2008-68-0x0000000000000000-mapping.dmp
-
memory/2012-115-0x0000000000000000-mapping.dmp
-
memory/2020-132-0x0000000000000000-mapping.dmp
-
memory/2032-105-0x0000000000000000-mapping.dmp
-
memory/2036-88-0x0000000000000000-mapping.dmp
-
memory/2036-182-0x0000000000000000-mapping.dmp
-
memory/2036-160-0x0000000000000000-mapping.dmp
-
memory/2044-167-0x0000000000000000-mapping.dmp