Analysis
-
max time kernel
35s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe
Resource
win10v2004-20220812-en
General
-
Target
96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe
-
Size
564KB
-
MD5
67aebb5b12ae70764e7835e5305bc460
-
SHA1
570d85a6ab69874f18458ee3de795c43321c4273
-
SHA256
96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e
-
SHA512
9846f822d6c0884c538544901f4d99623401690f769e8d504c1fc6a0f684fb7757e0db575720b6ac96487820c683a15b34d0b6c41346e270df5c739865696cdb
-
SSDEEP
12288:SeIHWQg2OJo6UTopWHLo/4NmOB2ltVb70tekUyoWaVscRKQv+8Y67:Seug2wmopW8/4Nmjl70Z9ajpl37
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\JaAsQUUI\\TyUoYoQs.exe," 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\JaAsQUUI\\TyUoYoQs.exe," 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 62 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe -
Executes dropped EXE 3 IoCs
pid Process 4816 oUwQoEwM.exe 2064 TyUoYoQs.exe 3396 GkIwIIIs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TyUoYoQs.exe = "C:\\ProgramData\\JaAsQUUI\\TyUoYoQs.exe" GkIwIIIs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oUwQoEwM.exe = "C:\\Users\\Admin\\iQcIYgww\\oUwQoEwM.exe" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TyUoYoQs.exe = "C:\\ProgramData\\JaAsQUUI\\TyUoYoQs.exe" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oUwQoEwM.exe = "C:\\Users\\Admin\\iQcIYgww\\oUwQoEwM.exe" oUwQoEwM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TyUoYoQs.exe = "C:\\ProgramData\\JaAsQUUI\\TyUoYoQs.exe" TyUoYoQs.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\iQcIYgww GkIwIIIs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\iQcIYgww\oUwQoEwM GkIwIIIs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3476 reg.exe 3628 reg.exe 2804 reg.exe 2320 reg.exe 4208 reg.exe 2568 reg.exe 3156 reg.exe 4224 reg.exe 4828 reg.exe 996 reg.exe 3544 reg.exe 3164 reg.exe 4584 reg.exe 4592 reg.exe 4896 reg.exe 4268 reg.exe 1452 reg.exe 1564 reg.exe 2060 reg.exe 2356 reg.exe 5100 reg.exe 668 reg.exe 4776 reg.exe 3932 reg.exe 4104 reg.exe 4444 reg.exe 3748 reg.exe 2756 reg.exe 5088 reg.exe 3828 reg.exe 3476 reg.exe 1276 reg.exe 4252 reg.exe 3256 reg.exe 436 reg.exe 112 reg.exe 3964 reg.exe 4432 reg.exe 4944 reg.exe 3160 reg.exe 1116 reg.exe 3112 reg.exe 1452 reg.exe 1112 reg.exe 4808 reg.exe 4980 reg.exe 1364 reg.exe 4760 reg.exe 2824 reg.exe 2148 reg.exe 1968 reg.exe 4076 reg.exe 1076 reg.exe 4000 reg.exe 4248 reg.exe 4232 reg.exe 1476 reg.exe 3996 reg.exe 1456 reg.exe 1284 reg.exe 432 reg.exe 1976 reg.exe 4252 reg.exe 4908 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4384 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4384 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4384 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4384 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2468 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2468 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2468 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2468 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4148 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4148 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4148 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4148 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4368 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4368 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4368 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4368 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 228 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 228 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 228 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 228 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1284 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1284 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1284 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1284 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 412 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 412 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 412 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 412 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4080 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4080 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4080 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4080 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2700 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2700 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2700 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 2700 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1300 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1300 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1300 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 1300 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3852 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3852 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3852 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3852 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3764 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3764 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3764 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 3764 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 4220 cscript.exe 4220 cscript.exe 4220 cscript.exe 4220 cscript.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4816 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 83 PID 4908 wrote to memory of 4816 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 83 PID 4908 wrote to memory of 4816 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 83 PID 4908 wrote to memory of 2064 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 84 PID 4908 wrote to memory of 2064 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 84 PID 4908 wrote to memory of 2064 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 84 PID 4908 wrote to memory of 1040 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 86 PID 4908 wrote to memory of 1040 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 86 PID 4908 wrote to memory of 1040 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 86 PID 1040 wrote to memory of 3496 1040 cmd.exe 88 PID 1040 wrote to memory of 3496 1040 cmd.exe 88 PID 1040 wrote to memory of 3496 1040 cmd.exe 88 PID 4908 wrote to memory of 4692 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 89 PID 4908 wrote to memory of 4692 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 89 PID 4908 wrote to memory of 4692 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 89 PID 4908 wrote to memory of 884 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 91 PID 4908 wrote to memory of 884 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 91 PID 4908 wrote to memory of 884 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 91 PID 4908 wrote to memory of 4216 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 93 PID 4908 wrote to memory of 4216 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 93 PID 4908 wrote to memory of 4216 4908 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 93 PID 3496 wrote to memory of 112 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 95 PID 3496 wrote to memory of 112 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 95 PID 3496 wrote to memory of 112 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 95 PID 112 wrote to memory of 2208 112 cmd.exe 97 PID 112 wrote to memory of 2208 112 cmd.exe 97 PID 112 wrote to memory of 2208 112 cmd.exe 97 PID 3496 wrote to memory of 5008 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 98 PID 3496 wrote to memory of 5008 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 98 PID 3496 wrote to memory of 5008 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 98 PID 3496 wrote to memory of 4732 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 105 PID 3496 wrote to memory of 4732 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 105 PID 3496 wrote to memory of 4732 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 105 PID 3496 wrote to memory of 4668 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 99 PID 3496 wrote to memory of 4668 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 99 PID 3496 wrote to memory of 4668 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 99 PID 3496 wrote to memory of 3020 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 103 PID 3496 wrote to memory of 3020 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 103 PID 3496 wrote to memory of 3020 3496 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 103 PID 2208 wrote to memory of 4860 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 106 PID 2208 wrote to memory of 4860 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 106 PID 2208 wrote to memory of 4860 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 106 PID 4860 wrote to memory of 4384 4860 cmd.exe 108 PID 4860 wrote to memory of 4384 4860 cmd.exe 108 PID 4860 wrote to memory of 4384 4860 cmd.exe 108 PID 2208 wrote to memory of 4972 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 109 PID 2208 wrote to memory of 4972 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 109 PID 2208 wrote to memory of 4972 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 109 PID 2208 wrote to memory of 4104 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 110 PID 2208 wrote to memory of 4104 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 110 PID 2208 wrote to memory of 4104 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 110 PID 2208 wrote to memory of 4444 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 111 PID 2208 wrote to memory of 4444 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 111 PID 2208 wrote to memory of 4444 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 111 PID 2208 wrote to memory of 3324 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 112 PID 2208 wrote to memory of 3324 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 112 PID 2208 wrote to memory of 3324 2208 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 112 PID 3020 wrote to memory of 392 3020 cmd.exe 117 PID 3020 wrote to memory of 392 3020 cmd.exe 117 PID 3020 wrote to memory of 392 3020 cmd.exe 117 PID 3324 wrote to memory of 3580 3324 cmd.exe 118 PID 3324 wrote to memory of 3580 3324 cmd.exe 118 PID 3324 wrote to memory of 3580 3324 cmd.exe 118 PID 4384 wrote to memory of 768 4384 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe 119 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe"C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\iQcIYgww\oUwQoEwM.exe"C:\Users\Admin\iQcIYgww\oUwQoEwM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4816
-
-
C:\ProgramData\JaAsQUUI\TyUoYoQs.exe"C:\ProgramData\JaAsQUUI\TyUoYoQs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"4⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"6⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"8⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"10⤵PID:1616
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:2384
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yykQAgYY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""10⤵PID:5100
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:2280
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:4156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:3880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YKosIQsw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""8⤵PID:4964
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4876
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:1672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"8⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e9⤵PID:1280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\naYsUgYQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""8⤵PID:2300
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:4104
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:4536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵PID:1936
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:4972
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:4104
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:4444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VAMEgcUY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:3580
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:5008
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wkMIIMYA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:392
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:4732
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"3⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e4⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"5⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e6⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"7⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e8⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"9⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e10⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"11⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e12⤵PID:1628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vkQkIIkg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""13⤵PID:5028
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xMYooMYQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""11⤵PID:3892
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs12⤵PID:1156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f11⤵PID:4124
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 211⤵
- UAC bypass
PID:3584
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 111⤵PID:3488
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pywYwIEI.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""9⤵PID:4964
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs10⤵PID:4552
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵PID:4284
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:452
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1564
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵PID:3164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mYYIgEIo.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""7⤵PID:3680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵
- Modifies registry key
PID:3544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵PID:4228
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fQEcoMUw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""5⤵PID:5108
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1712
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵
- Modifies registry key
PID:1976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵PID:4368
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3052
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:3160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UGckkEYM.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""3⤵PID:1812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3084
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:364
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:884
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iMUEcsEg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:4156
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3648
-
-
-
C:\ProgramData\RmQgcwww\GkIwIIIs.exeC:\ProgramData\RmQgcwww\GkIwIIIs.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3396
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"4⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e5⤵
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"6⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"8⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e9⤵
- Suspicious behavior: EnumeratesProcesses
PID:412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"10⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"12⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"14⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"16⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"18⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"20⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e21⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"22⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e23⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"24⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e25⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"26⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e27⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"28⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e29⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"30⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e31⤵PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VOwgIsAE.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""30⤵PID:2972
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:2812
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- Modifies registry key
PID:112
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:1356
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:5028
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e31⤵PID:4168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"32⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e33⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"34⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e35⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"36⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e37⤵PID:3556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NIcUEEQc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""38⤵PID:464
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:4308
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵PID:4716
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
- Modifies visibility of file extensions in Explorer
PID:2232
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
PID:1028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"38⤵PID:3856
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yqIkEUMk.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""36⤵PID:3256
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- Modifies registry key
PID:4980
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:2860
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:3060
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EAoYsEgw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""34⤵PID:816
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
- Modifies registry key
PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:3340
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EqckcAAc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""28⤵PID:1216
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:2468
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵PID:3584
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵PID:4244
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵PID:2236
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:2320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zIwgMAYE.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""26⤵PID:4320
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:1244
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
PID:2824
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵PID:32
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CewQsIQs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""24⤵PID:212
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:1504
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵PID:2756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:2396
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵PID:1856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tKQIoMEs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""22⤵PID:4964
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:2576
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
PID:4592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:4264
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:996
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:3160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YYMkUcQk.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""20⤵PID:868
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:3352
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:364
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EoMEwwMw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""18⤵PID:3828
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:412
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e19⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"20⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e21⤵PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tycIEcAg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""20⤵PID:4948
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:4656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:3084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵PID:4484
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵
- UAC bypass
PID:2708
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:5088
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:3660
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:1688
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
- Modifies registry key
PID:436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LAcoIQUU.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""16⤵PID:1172
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:2672
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:388
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:2824
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cuAcQUwI.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""14⤵PID:112
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:3504
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:1620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HGQYgYMk.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""12⤵PID:884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:2604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵
- UAC bypass
PID:1076
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:4216
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:5056
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qUEUoAkY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""10⤵PID:2300
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:4072
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:4120
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:816
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
PID:3376
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:4240
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:4156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:2672
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:3828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XgwoEsMw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""8⤵PID:3004
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4956
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:4156
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e7⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VqIwcAAM.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""8⤵PID:3400
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4124
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:2812
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:1824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵PID:512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"8⤵PID:3656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HskcYAok.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""8⤵PID:3108
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:4028
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:4128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5048
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵PID:640
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:1456
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ngQEQYIw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""6⤵PID:1168
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jaogEswA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""8⤵PID:4332
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:3212
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
PID:3964
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:3060
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"8⤵PID:5048
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NWEQIogg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""6⤵PID:2092
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2632
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:1076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:4072
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:3476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"6⤵PID:3428
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:2056
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:4248
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VyMAoQsQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""4⤵PID:1444
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3684
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3748
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3068
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:3632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cMAsIocA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:3952
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:5028
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:1856
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1604
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eysMMkYA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:4772
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:1124 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1916
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2356
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵
- Modifies visibility of file extensions in Explorer
PID:5008
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BiYUQIEs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:904
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uQsoAkYM.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:4328
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:3996
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2732
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e3⤵PID:1452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4000
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3176
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e3⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dsgMoIIc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""4⤵PID:2516
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:3112
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:2056
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:4264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"4⤵PID:3340
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dAAYAoQI.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:2364
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:1116
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3208
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3376
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3068
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EgwAQgwY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:1076
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1692
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:3164
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1364
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵PID:2860
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cGMwAYAY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:2476
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4748
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1276
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3388
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4332
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2512
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:2708
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:364
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2288
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"2⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e3⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MQEcccwA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""4⤵PID:4260
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1412
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:2060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3020
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:4256
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:2804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"4⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e4⤵PID:4216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Modifies visibility of file extensions in Explorer
PID:4368
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- UAC bypass
PID:5056
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4772
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XWkccIoY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""2⤵PID:1324
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:2840
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BIUQscIE.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:4876
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1076
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:4512
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4516
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:2168
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e2⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"3⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e4⤵PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MckkIYEE.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""3⤵PID:3060
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:4236
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:2700
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ocMskIso.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:4856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Modifies visibility of file extensions in Explorer
PID:3488
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2660
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
- Modifies registry key
PID:1112
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- UAC bypass
PID:1116
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies registry key
PID:4432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"3⤵PID:744
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:4916
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1552
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:1820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:3788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e2⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"3⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e4⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"5⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e6⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"7⤵PID:4224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e8⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"9⤵PID:1216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e10⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"11⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3164 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Modifies visibility of file extensions in Explorer
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e12⤵PID:2384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"13⤵PID:2708
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e14⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"15⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e16⤵
- Modifies visibility of file extensions in Explorer
PID:220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"17⤵PID:1040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e18⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"19⤵PID:3532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e20⤵
- Modifies visibility of file extensions in Explorer
PID:4228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"21⤵PID:452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e22⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"23⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e24⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"25⤵PID:4592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV126⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e26⤵
- Modifies visibility of file extensions in Explorer
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"27⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e28⤵
- Modifies visibility of file extensions in Explorer
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"29⤵PID:4076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV130⤵
- UAC bypass
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e31⤵PID:988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"32⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e33⤵PID:3664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"34⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e35⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"36⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e37⤵PID:464
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HmMwAQEA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""34⤵PID:1200
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:4988
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:4332
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:1576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:3428
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies registry key
PID:1452
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BUYQAooc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""32⤵PID:4384
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:4952
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
PID:4808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e30⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"31⤵
- Modifies visibility of file extensions in Explorer
PID:3376 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e32⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"33⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e34⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"35⤵PID:2272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV136⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e36⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"37⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e38⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"39⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e40⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"41⤵
- Modifies visibility of file extensions in Explorer
PID:512 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e42⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"43⤵
- Modifies visibility of file extensions in Explorer
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e44⤵PID:3852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"45⤵PID:4668
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV146⤵
- UAC bypass
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e46⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"47⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e48⤵PID:804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"49⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e50⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"51⤵PID:996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV152⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e52⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"53⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e54⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"55⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e56⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"57⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e58⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"59⤵PID:816
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵
- Modifies visibility of file extensions in Explorer
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e60⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"61⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e62⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"63⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e64⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"65⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e66⤵PID:412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"67⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e68⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"69⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e70⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"71⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mqgYQYUI.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""71⤵PID:3468
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs72⤵PID:3584
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f71⤵PID:536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 271⤵PID:220
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 171⤵PID:4080
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JIcIgcAs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""69⤵PID:3060
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs70⤵PID:4912
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f69⤵
- Modifies registry key
PID:1284
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 269⤵PID:912
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 169⤵
- Modifies registry key
PID:2804
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mWMskUkU.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""67⤵PID:2656
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs68⤵PID:1776
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f67⤵PID:1976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 267⤵PID:4444
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 167⤵
- Modifies registry key
PID:4944
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tMckcQIY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""65⤵PID:4776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV166⤵PID:4932
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs66⤵PID:4768
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f65⤵PID:2824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 265⤵
- Modifies registry key
PID:3628
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 165⤵PID:212
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yYUQMwAA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""63⤵PID:548
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs64⤵PID:3212
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f63⤵PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 263⤵
- Modifies registry key
PID:1456
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 163⤵PID:4276
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qaoIkAUc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""61⤵PID:4908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV162⤵
- Modifies visibility of file extensions in Explorer
PID:1156
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs62⤵PID:1548
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f61⤵PID:4568
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 261⤵PID:536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 161⤵PID:4080
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CSUMYIgU.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""59⤵PID:452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:2708
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs60⤵PID:4308
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f59⤵PID:5084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 259⤵PID:4492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 159⤵PID:3340
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HEEYAsYY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""57⤵
- Modifies visibility of file extensions in Explorer
PID:1324 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV158⤵PID:3164
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs58⤵PID:4224
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f57⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 257⤵PID:4108
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 157⤵
- Modifies registry key
PID:3256
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IIMoUUYg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""55⤵PID:3964
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs56⤵PID:3856
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f55⤵PID:3376
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 255⤵
- Modifies registry key
PID:4252
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 155⤵PID:4124
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nuYkIgco.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""53⤵PID:3520
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs54⤵PID:4156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f53⤵PID:2540
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 253⤵PID:4708
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 153⤵PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vaokkEYA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""51⤵PID:1116
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs52⤵PID:3764
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f51⤵PID:4584
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 251⤵PID:1472
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 151⤵
- Modifies registry key
PID:5100
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 149⤵PID:4308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SaQgIYQg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""49⤵PID:1748
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs50⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3400
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f49⤵
- Modifies visibility of file extensions in Explorer
PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 249⤵
- UAC bypass
- Modifies registry key
PID:4828
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 147⤵PID:2592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 247⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oqggEwIc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""47⤵PID:2272
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs48⤵PID:1216
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f47⤵
- Modifies registry key
PID:4224
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xGIEwAIA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""45⤵
- Modifies visibility of file extensions in Explorer
PID:2188 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs46⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1812
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f45⤵PID:744
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 245⤵PID:1564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 145⤵PID:2300
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f43⤵
- Modifies registry key
PID:4760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WGwEwgwk.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""43⤵PID:4980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs44⤵PID:1976
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 243⤵
- Modifies registry key
PID:1452 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV144⤵PID:4808
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 143⤵PID:1544
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 141⤵
- UAC bypass
PID:1548 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:1412
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 241⤵
- Modifies visibility of file extensions in Explorer
PID:1700
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f41⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nqksoEYw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""41⤵PID:1124
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs42⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4656
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 139⤵PID:1000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 239⤵PID:3648
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f39⤵PID:3656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NoUAQMYg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""39⤵PID:1832
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs40⤵PID:4248
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HGIAcsAQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""37⤵PID:3176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV138⤵PID:2168
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs38⤵PID:4908
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f37⤵PID:4260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 237⤵
- Modifies visibility of file extensions in Explorer
PID:4484
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 137⤵
- Modifies registry key
PID:4268
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 235⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UQUQkksc.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""35⤵PID:3632
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs36⤵PID:4768
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f35⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 135⤵PID:3472
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 133⤵PID:2816
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV134⤵PID:4220
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 233⤵PID:4120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV134⤵PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\COAcAYYs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""33⤵
- Modifies visibility of file extensions in Explorer
PID:4232 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs34⤵PID:5024
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f33⤵PID:1200
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 231⤵PID:1340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:4004
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 131⤵PID:3712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IQcwcQQw.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""31⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4948 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs32⤵PID:2236
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f31⤵
- Modifies registry key
PID:3156 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:1628
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fWogIIUo.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""29⤵
- Modifies visibility of file extensions in Explorer
PID:3940 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs30⤵
- Modifies visibility of file extensions in Explorer
PID:1936
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f29⤵
- Modifies registry key
PID:2568
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 229⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1364
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 129⤵
- UAC bypass
PID:4860
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 127⤵
- Modifies registry key
PID:4908
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 227⤵PID:5028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wkskswEY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""27⤵PID:1616
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs28⤵PID:1940
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f27⤵PID:3740
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GsUAIgIs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""25⤵PID:4740
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs26⤵PID:4260
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f25⤵
- Modifies visibility of file extensions in Explorer
PID:640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 225⤵PID:3444
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 125⤵PID:4128
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 123⤵PID:3084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:2460
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 223⤵
- Modifies registry key
PID:4252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\teMwYMYE.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""23⤵PID:1296
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs24⤵PID:3440
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f23⤵
- UAC bypass
PID:3964
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 121⤵
- Modifies registry key
PID:4208 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\deIwQMYA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""21⤵PID:4932
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs22⤵PID:4808
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f21⤵
- UAC bypass
- Modifies registry key
PID:4000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 221⤵
- Modifies registry key
PID:4104
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 119⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\weQgEgMQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""19⤵PID:756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵PID:1552
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs20⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4980
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f19⤵
- UAC bypass
PID:2644 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵PID:2132
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 219⤵PID:2848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV120⤵
- Modifies visibility of file extensions in Explorer
PID:512
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 117⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\suQUUsIA.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""17⤵PID:4004
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs18⤵PID:3656
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f17⤵
- Modifies registry key
PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 217⤵
- Modifies registry key
PID:4076
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 115⤵PID:1324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IwMkwEEY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""15⤵PID:4248
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs16⤵PID:3244
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f15⤵PID:4828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵
- Modifies visibility of file extensions in Explorer
PID:1816
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 215⤵PID:1748
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 113⤵PID:3696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:3548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\awIIEggs.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""13⤵
- Modifies visibility of file extensions in Explorer
PID:3060 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs14⤵PID:4964
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f13⤵PID:3476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 213⤵PID:4216
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 111⤵PID:2700
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f11⤵
- UAC bypass
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XsgoIQgE.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""11⤵
- Modifies visibility of file extensions in Explorer
PID:884 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs12⤵PID:904
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 211⤵PID:4232
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵PID:1816
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵PID:3400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:3132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RQAUMswM.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""9⤵PID:2372
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs10⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:4956
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jmIcUMwY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""7⤵PID:3320
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:988
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵PID:4948
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:728
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FmUEUkgY.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""5⤵PID:3260
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1824
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- Modifies registry key
PID:4776
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:4084
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:1604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rUwUMgwQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""3⤵PID:3020
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:2252
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:4860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e3⤵PID:228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ymkkscwk.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:5076
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1028
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1812
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2328
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:1476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:32
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HAUUYIEg.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:1356
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:812
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3608
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e2⤵PID:4716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:3856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zIQkYUgI.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:4172
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yMMwAsQQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:4556
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4732
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2468
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VUIYMQYU.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:5092
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:2060
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4768
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:536
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:1916
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exeC:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e1⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lUcAsEEQ.bat" "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e.exe""1⤵PID:1220
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
- Modifies registry key
PID:4584 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:220
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3504
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵PID:2372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4776
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5076
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:112
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:1776
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies visibility of file extensions in Explorer
PID:4924
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\96f37a5838762ee598ec925d80b741116ba37c8f1605859f5164bbb8cc42125e"1⤵
- Modifies visibility of file extensions in Explorer
PID:1548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4124
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2488
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD583dc529aefb44f38ad83260d66f41cd5
SHA1dea77cc56ee2ab19cd861dfc150daf210a140d55
SHA2563f96163bf29ae2c5bad01161911f3efae90a7a759311c865b5ba8c2fb04f909a
SHA5123e134ef9494426e6b91376929dd08c4446426e6fe9d03028c00cecdbf2555daa1ec2a39b8c65b2063d4d15e7f365d504496810efc8779c4784bb3a21e6b97c9b
-
Filesize
484KB
MD583dc529aefb44f38ad83260d66f41cd5
SHA1dea77cc56ee2ab19cd861dfc150daf210a140d55
SHA2563f96163bf29ae2c5bad01161911f3efae90a7a759311c865b5ba8c2fb04f909a
SHA5123e134ef9494426e6b91376929dd08c4446426e6fe9d03028c00cecdbf2555daa1ec2a39b8c65b2063d4d15e7f365d504496810efc8779c4784bb3a21e6b97c9b
-
Filesize
483KB
MD53bc2ae5a5111bbf41ebd8163e80fb8a0
SHA1314e8bd6b0c734b098c2c2bdf23d501175666b2a
SHA256b731643db005872f9e30a4a78d9ab73818afca5d6b8b4263a427dfdb68e1f25e
SHA51216659936fe4a2caa1cc366c2aa33cad023be4b331e8269c24a75eb671f34493bf86800afc1267528d3447d5b77b3bc79faf1138ff3048f139e5b0e817d379fcf
-
Filesize
483KB
MD53bc2ae5a5111bbf41ebd8163e80fb8a0
SHA1314e8bd6b0c734b098c2c2bdf23d501175666b2a
SHA256b731643db005872f9e30a4a78d9ab73818afca5d6b8b4263a427dfdb68e1f25e
SHA51216659936fe4a2caa1cc366c2aa33cad023be4b331e8269c24a75eb671f34493bf86800afc1267528d3447d5b77b3bc79faf1138ff3048f139e5b0e817d379fcf
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
75KB
MD53df360b9de481c9f41b562c14765b03d
SHA100a7c134ef5e34efabff9a14506ca372e5459b4a
SHA256c491fc25d5ccc0a745bd55720fbcf72b6c67e8a26862ad8934dab998098ad39e
SHA512f0e03911a8f636f0c94bdfde7a9bc53b012d2d906825da0396ea3224948aa1a3f4ce87785e9fced4eae02961c6d03acb5681d226713cc853ff6f1cce5e382fc5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
482KB
MD5bfbc8ad044f231d5ba228f98b3112217
SHA1dcf5f7db7487c7cf11f0100d356d40ddb5925dee
SHA256d11c51ac86e0aa9d7e964ed2edd96dcb86d0db705dee95de5238d8af3f6be8ba
SHA5123a32a0ce6c0622e7a5d263cd7aa0c661abe567501b0e0060c56618531917ac8d5b746997657d926c56060b09e02d0d4233ee0375824d997abf6c46dd66a3b425
-
Filesize
482KB
MD5bfbc8ad044f231d5ba228f98b3112217
SHA1dcf5f7db7487c7cf11f0100d356d40ddb5925dee
SHA256d11c51ac86e0aa9d7e964ed2edd96dcb86d0db705dee95de5238d8af3f6be8ba
SHA5123a32a0ce6c0622e7a5d263cd7aa0c661abe567501b0e0060c56618531917ac8d5b746997657d926c56060b09e02d0d4233ee0375824d997abf6c46dd66a3b425