Analysis
-
max time kernel
129s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-05-2021 12:46
Static task
static1
Behavioral task
behavioral1
Sample
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe
Resource
win10v20210408
General
-
Target
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe
-
Size
532KB
-
MD5
2146eb12d4f3329cb86bb6d297f6c157
-
SHA1
8ad0a576e0f8b3cc3f10d5cf75d9bb6890ded77d
-
SHA256
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb
-
SHA512
d700600c6b41f4231b93b424624292a0cd8106204b00a3c550dab67bee526686a003511508390b3ece947506ea084e9a2cf77e0c84c00edf400f8e67099f39f9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\VEQEYwoA\\TUEEgsAQ.exe," 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\VEQEYwoA\\TUEEgsAQ.exe," 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
xgcosEws.exeTUEEgsAQ.exepcsUUkIQ.exepid process 2256 xgcosEws.exe 3444 TUEEgsAQ.exe 3556 pcsUUkIQ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
TUEEgsAQ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation TUEEgsAQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
xgcosEws.exeTUEEgsAQ.exepcsUUkIQ.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\xgcosEws.exe = "C:\\Users\\Admin\\kqIIEcwU\\xgcosEws.exe" xgcosEws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TUEEgsAQ.exe = "C:\\ProgramData\\VEQEYwoA\\TUEEgsAQ.exe" TUEEgsAQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TUEEgsAQ.exe = "C:\\ProgramData\\VEQEYwoA\\TUEEgsAQ.exe" pcsUUkIQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\xgcosEws.exe = "C:\\Users\\Admin\\kqIIEcwU\\xgcosEws.exe" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TUEEgsAQ.exe = "C:\\ProgramData\\VEQEYwoA\\TUEEgsAQ.exe" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe -
Processes:
cmd.execscript.execscript.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execscript.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 3 IoCs
Processes:
pcsUUkIQ.exeTUEEgsAQ.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\kqIIEcwU pcsUUkIQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\kqIIEcwU\xgcosEws pcsUUkIQ.exe File created C:\Windows\SysWOW64\shell32.dll.exe TUEEgsAQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2888 reg.exe 2552 reg.exe 2888 reg.exe 2664 reg.exe 3800 reg.exe 2552 reg.exe 3824 reg.exe 3944 reg.exe 2808 reg.exe 2308 reg.exe 2188 reg.exe 2988 reg.exe 3008 reg.exe 3784 reg.exe 2960 reg.exe 3800 reg.exe 1020 reg.exe 2152 reg.exe 3952 reg.exe 3480 reg.exe 1632 reg.exe 1872 reg.exe 2552 reg.exe 2248 reg.exe 2300 reg.exe 768 reg.exe 2172 reg.exe 1164 reg.exe 1336 reg.exe 768 reg.exe 3012 reg.exe 3588 reg.exe 2300 reg.exe 1976 reg.exe 2264 reg.exe 3620 reg.exe 3972 reg.exe 2860 reg.exe 2196 reg.exe 976 reg.exe 1704 reg.exe 1324 reg.exe 1336 reg.exe 2248 reg.exe 3744 reg.exe 2064 reg.exe 1324 reg.exe 3716 reg.exe 2248 reg.exe 3688 reg.exe 3008 reg.exe 1160 reg.exe 2276 reg.exe 3768 reg.exe 2248 reg.exe 492 reg.exe 2196 reg.exe 3744 reg.exe 3252 reg.exe 2264 reg.exe 916 reg.exe 1288 reg.exe 740 reg.exe 3684 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeConhost.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execscript.exereg.exeConhost.exeConhost.exeConhost.exepid process 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2248 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2248 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2248 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2248 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3892 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3892 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3892 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3892 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1632 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1632 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1632 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 1632 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3704 Conhost.exe 3704 Conhost.exe 3704 Conhost.exe 3704 Conhost.exe 2100 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2100 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2100 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2100 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2104 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2104 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2104 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2104 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3940 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3940 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3940 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 3940 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe 2208 cscript.exe 2208 cscript.exe 2208 cscript.exe 2208 cscript.exe 1164 reg.exe 1164 reg.exe 1164 reg.exe 1164 reg.exe 3988 Conhost.exe 3988 Conhost.exe 3988 Conhost.exe 3988 Conhost.exe 2064 Conhost.exe 2064 Conhost.exe 2064 Conhost.exe 2064 Conhost.exe 2752 Conhost.exe 2752 Conhost.exe 2752 Conhost.exe 2752 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exedescription pid process target process PID 636 wrote to memory of 2256 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe xgcosEws.exe PID 636 wrote to memory of 2256 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe xgcosEws.exe PID 636 wrote to memory of 2256 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe xgcosEws.exe PID 636 wrote to memory of 3444 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe TUEEgsAQ.exe PID 636 wrote to memory of 3444 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe TUEEgsAQ.exe PID 636 wrote to memory of 3444 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe TUEEgsAQ.exe PID 636 wrote to memory of 2860 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 636 wrote to memory of 2860 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 636 wrote to memory of 2860 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 636 wrote to memory of 3012 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 3012 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 3012 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 2888 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 2888 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 2888 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 1976 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 1976 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 636 wrote to memory of 1976 636 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2860 wrote to memory of 1704 2860 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2860 wrote to memory of 1704 2860 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2860 wrote to memory of 1704 2860 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1704 wrote to memory of 3704 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1704 wrote to memory of 3704 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1704 wrote to memory of 3704 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1704 wrote to memory of 3784 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 3784 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 3784 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 3800 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 3800 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 3800 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 2276 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 2276 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 2276 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 1704 wrote to memory of 2840 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1704 wrote to memory of 2840 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1704 wrote to memory of 2840 1704 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 3704 wrote to memory of 2224 3704 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 3704 wrote to memory of 2224 3704 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 3704 wrote to memory of 2224 3704 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2840 wrote to memory of 3716 2840 cmd.exe cscript.exe PID 2840 wrote to memory of 3716 2840 cmd.exe cscript.exe PID 2840 wrote to memory of 3716 2840 cmd.exe cscript.exe PID 2224 wrote to memory of 1500 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 2224 wrote to memory of 1500 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 2224 wrote to memory of 1500 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1500 wrote to memory of 1344 1500 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1500 wrote to memory of 1344 1500 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 1500 wrote to memory of 1344 1500 cmd.exe 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe PID 2224 wrote to memory of 2888 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2888 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2888 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2736 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2736 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2736 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2300 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2300 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 2300 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe reg.exe PID 2224 wrote to memory of 3316 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 2224 wrote to memory of 3316 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 2224 wrote to memory of 3316 2224 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1344 wrote to memory of 1632 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1344 wrote to memory of 1632 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1344 wrote to memory of 1632 1344 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe cmd.exe PID 1344 wrote to memory of 3944 1344 reg.exe -
System policy modification 1 TTPs 18 IoCs
Processes:
cmd.execmd.execscript.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.execmd.execscript.execscript.exe279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe"C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\kqIIEcwU\xgcosEws.exe"C:\Users\Admin\kqIIEcwU\xgcosEws.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\VEQEYwoA\TUEEgsAQ.exe"C:\ProgramData\VEQEYwoA\TUEEgsAQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"8⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"10⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"12⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"14⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb15⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"16⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"18⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"20⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb21⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"22⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb23⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"24⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb25⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"26⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb27⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"28⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb29⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"30⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb31⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"32⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb33⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"34⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb35⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"36⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb37⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"38⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb39⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"40⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb41⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"42⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb43⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"44⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb45⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"46⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb47⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"48⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb49⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"50⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb51⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"52⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb53⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"54⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb55⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"56⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb57⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"58⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb59⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"60⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb61⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"62⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb63⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"64⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb65⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"66⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb67⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"68⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb69⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"70⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb71⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"72⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb73⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"74⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb75⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"76⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb77⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"78⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb79⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"80⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb81⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"82⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb83⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"84⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"86⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb87⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"88⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb89⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"90⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb91⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb"92⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exeC:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb93⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QewsccwU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""92⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lEkEgksQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""90⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TEYIMEoc.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""88⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dMMgwAIQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""86⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pOswMQww.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""84⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lAsssQIA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""82⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XiEEMIYQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""80⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NUsUwgwQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""78⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PkUsAYME.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""76⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZeYkIwEs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""74⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wGwsQwAU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""72⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gWkUwssw.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""70⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wmkMgEkg.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""68⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jAwYowcM.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""66⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aSAswwYE.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""64⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fMMYAkgA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""62⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FKYowooQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""60⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rQUgcAQw.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""58⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hAkoAMgk.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""56⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oAAwIEIg.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""54⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xukMUAkw.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""52⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qUEswcgU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""50⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV150⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KaIcskYs.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""48⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bIcocIIw.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""46⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YycUIQsA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""44⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV144⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JasAUwos.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""42⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TkMwQAYU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bwoMQgEo.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IuwAowYc.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmEIkYYQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nacMEYkg.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""32⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sGQYkQsg.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""30⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pMYUswAo.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""28⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sCIwkQEA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zukgQcAw.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""24⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ckgkooUg.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UMgEoQsk.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ycwQgsgA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ngUwYEgU.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\giAAcoYY.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""14⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BEcMwUgM.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nmckwsAA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MykIcQkA.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QYwQMIgQ.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""6⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HaksscUE.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PqkksIUk.bat" "C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffb.exe""2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\ProgramData\uMoEEcQA\pcsUUkIQ.exeC:\ProgramData\uMoEEcQA\pcsUUkIQ.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\VEQEYwoA\TUEEgsAQ.exeMD5
d5b94aba50eca9b51672c3940eba9404
SHA1ec8b22b884d794936de0b3a8a5de3b9ab4dd6ecd
SHA256fef422e75ea612a1081d7ab1b559807fac016bb7d7e034ad1ed4688e9590f935
SHA5121c26a89f25fb6f9867076d254d69bb3a25a535f52e344285d44be5ff1db0349af092a9ecfee887ddcfe7fe23cd2a3607b705e7d866187a9ce31d4cf61e3811ec
-
C:\ProgramData\VEQEYwoA\TUEEgsAQ.exeMD5
d5b94aba50eca9b51672c3940eba9404
SHA1ec8b22b884d794936de0b3a8a5de3b9ab4dd6ecd
SHA256fef422e75ea612a1081d7ab1b559807fac016bb7d7e034ad1ed4688e9590f935
SHA5121c26a89f25fb6f9867076d254d69bb3a25a535f52e344285d44be5ff1db0349af092a9ecfee887ddcfe7fe23cd2a3607b705e7d866187a9ce31d4cf61e3811ec
-
C:\ProgramData\uMoEEcQA\pcsUUkIQ.exeMD5
cb897de0da113ca0458f03a726918149
SHA118cf2c4802d43f7a4dd777de469f46884df46777
SHA25649deed7c0015c7d8fde06c3c98617936e0e68c8282c26891192767805abc00f3
SHA5122a3d84d550eb809d819fe355f598511a74027301f7292e0d27da39560f42f98efce94acba00d0595df47555987da597a42a5ba5814398d61df6e6e644184142c
-
C:\ProgramData\uMoEEcQA\pcsUUkIQ.exeMD5
cb897de0da113ca0458f03a726918149
SHA118cf2c4802d43f7a4dd777de469f46884df46777
SHA25649deed7c0015c7d8fde06c3c98617936e0e68c8282c26891192767805abc00f3
SHA5122a3d84d550eb809d819fe355f598511a74027301f7292e0d27da39560f42f98efce94acba00d0595df47555987da597a42a5ba5814398d61df6e6e644184142c
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\279e64be324c8c9f3863e3bb4aecee03e64a34c071c3fb70b007a2833079fffbMD5
3112db426b23656c88a16cb67178da8e
SHA1d91f012df2c62efac5cf69960e7e2e527a8eddee
SHA25696a7352a3a51d1a15de013eccb3e13b87c4bc23a0275b7ca9e03fd0c7579e1ba
SHA512375a9398e0ca437445758870a8e916974c6c2d8e08664d5132c3662ea059182a41b5fd9521e19f9c4813e0fe5355a30f0e60bc9d02ebca199eac82ffe1241a97
-
C:\Users\Admin\AppData\Local\Temp\BEcMwUgM.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\HaksscUE.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\IuwAowYc.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\JasAUwos.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\MykIcQkA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\QYwQMIgQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\TkMwQAYU.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\UMgEoQsk.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\bwoMQgEo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\ckgkooUg.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\file.vbsMD5
4afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\giAAcoYY.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\nacMEYkg.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\ngUwYEgU.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\nmckwsAA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\pMYUswAo.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\sCIwkQEA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\sGQYkQsg.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\tmEIkYYQ.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\ycwQgsgA.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\zukgQcAw.batMD5
bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\kqIIEcwU\xgcosEws.exeMD5
d6553ab8cf7c246718a7ba35d770753f
SHA18c7b8eff4d36ca8cf634415398edbd1b61211ec2
SHA2562703821449473f91087d2c1946b71aa7a633c63da6a85066646748d6444001b7
SHA512a4e87860a4c62cd336d27330df5b08e84add9d04859a4d39a4af8b9be705890033ce879949888ed5d925f3b65653345f935d0e5062ac8dd11eb98e48e0afb9bc
-
C:\Users\Admin\kqIIEcwU\xgcosEws.exeMD5
d6553ab8cf7c246718a7ba35d770753f
SHA18c7b8eff4d36ca8cf634415398edbd1b61211ec2
SHA2562703821449473f91087d2c1946b71aa7a633c63da6a85066646748d6444001b7
SHA512a4e87860a4c62cd336d27330df5b08e84add9d04859a4d39a4af8b9be705890033ce879949888ed5d925f3b65653345f935d0e5062ac8dd11eb98e48e0afb9bc
-
memory/672-204-0x0000000000000000-mapping.dmp
-
memory/740-170-0x0000000000000000-mapping.dmp
-
memory/768-198-0x0000000000000000-mapping.dmp
-
memory/784-156-0x0000000000000000-mapping.dmp
-
memory/976-187-0x0000000000000000-mapping.dmp
-
memory/980-202-0x0000000000000000-mapping.dmp
-
memory/1020-181-0x0000000000000000-mapping.dmp
-
memory/1288-199-0x0000000000000000-mapping.dmp
-
memory/1336-160-0x0000000000000000-mapping.dmp
-
memory/1344-138-0x0000000000000000-mapping.dmp
-
memory/1500-137-0x0000000000000000-mapping.dmp
-
memory/1632-144-0x0000000000000000-mapping.dmp
-
memory/1632-173-0x0000000000000000-mapping.dmp
-
memory/1704-126-0x0000000000000000-mapping.dmp
-
memory/1976-180-0x0000000000000000-mapping.dmp
-
memory/1976-125-0x0000000000000000-mapping.dmp
-
memory/2100-191-0x0000000000000000-mapping.dmp
-
memory/2104-206-0x0000000000000000-mapping.dmp
-
memory/2168-162-0x0000000000000000-mapping.dmp
-
memory/2224-133-0x0000000000000000-mapping.dmp
-
memory/2224-158-0x0000000000000000-mapping.dmp
-
memory/2248-151-0x0000000000000000-mapping.dmp
-
memory/2256-114-0x0000000000000000-mapping.dmp
-
memory/2264-189-0x0000000000000000-mapping.dmp
-
memory/2268-149-0x0000000000000000-mapping.dmp
-
memory/2276-131-0x0000000000000000-mapping.dmp
-
memory/2300-141-0x0000000000000000-mapping.dmp
-
memory/2308-172-0x0000000000000000-mapping.dmp
-
memory/2364-183-0x0000000000000000-mapping.dmp
-
memory/2552-178-0x0000000000000000-mapping.dmp
-
memory/2672-147-0x0000000000000000-mapping.dmp
-
memory/2736-140-0x0000000000000000-mapping.dmp
-
memory/2808-188-0x0000000000000000-mapping.dmp
-
memory/2840-132-0x0000000000000000-mapping.dmp
-
memory/2856-200-0x0000000000000000-mapping.dmp
-
memory/2860-122-0x0000000000000000-mapping.dmp
-
memory/2888-139-0x0000000000000000-mapping.dmp
-
memory/2888-124-0x0000000000000000-mapping.dmp
-
memory/2972-171-0x0000000000000000-mapping.dmp
-
memory/3008-182-0x0000000000000000-mapping.dmp
-
memory/3008-194-0x0000000000000000-mapping.dmp
-
memory/3012-123-0x0000000000000000-mapping.dmp
-
memory/3052-201-0x0000000000000000-mapping.dmp
-
memory/3068-146-0x0000000000000000-mapping.dmp
-
memory/3256-169-0x0000000000000000-mapping.dmp
-
memory/3316-142-0x0000000000000000-mapping.dmp
-
memory/3444-117-0x0000000000000000-mapping.dmp
-
memory/3688-165-0x0000000000000000-mapping.dmp
-
memory/3704-179-0x0000000000000000-mapping.dmp
-
memory/3704-128-0x0000000000000000-mapping.dmp
-
memory/3716-135-0x0000000000000000-mapping.dmp
-
memory/3784-129-0x0000000000000000-mapping.dmp
-
memory/3784-208-0x0000000000000000-mapping.dmp
-
memory/3784-186-0x0000000000000000-mapping.dmp
-
memory/3784-153-0x0000000000000000-mapping.dmp
-
memory/3796-175-0x0000000000000000-mapping.dmp
-
memory/3800-130-0x0000000000000000-mapping.dmp
-
memory/3824-185-0x0000000000000000-mapping.dmp
-
memory/3892-163-0x0000000000000000-mapping.dmp
-
memory/3912-159-0x0000000000000000-mapping.dmp
-
memory/3944-145-0x0000000000000000-mapping.dmp
-
memory/3944-161-0x0000000000000000-mapping.dmp
-
memory/3972-168-0x0000000000000000-mapping.dmp
-
memory/3988-196-0x0000000000000000-mapping.dmp