Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 17:24
Static task
static1
Behavioral task
behavioral1
Sample
f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe
Resource
win10v2004-20220812-en
General
-
Target
f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe
-
Size
440KB
-
MD5
4e95dd509b07d6db6dbda57435cf93a0
-
SHA1
64f5bd9bfa61e5f9cbedcdd17bbdc9927c033af2
-
SHA256
f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0
-
SHA512
ebae596e1ae599e974a2779bfb438f3494977b3eb1d7839cc78b25eaa49d6a8ff82e467c59035f308f896c127611cc35d4a4cfeb92b52631bc0547944cbe8aa8
-
SSDEEP
12288:xwjRTCUts6Y9uQMZrL77QIuX9zG8uj5Hb+AqD:6dfNvQMZ77QJLu1iAqD
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 816 PiQsUUMI.exe 1704 ywsoQUYU.exe 1100 uaIsUoEA.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ExitRequest.png.exe PiQsUUMI.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation PiQsUUMI.exe -
Loads dropped DLL 22 IoCs
pid Process 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ywsoQUYU.exe = "C:\\ProgramData\\mYUEkcMg\\ywsoQUYU.exe" uaIsUoEA.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\PiQsUUMI.exe = "C:\\Users\\Admin\\sgoMMggU\\PiQsUUMI.exe" f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ywsoQUYU.exe = "C:\\ProgramData\\mYUEkcMg\\ywsoQUYU.exe" f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\PiQsUUMI.exe = "C:\\Users\\Admin\\sgoMMggU\\PiQsUUMI.exe" PiQsUUMI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ywsoQUYU.exe = "C:\\ProgramData\\mYUEkcMg\\ywsoQUYU.exe" ywsoQUYU.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\sgoMMggU\PiQsUUMI uaIsUoEA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\sgoMMggU uaIsUoEA.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico PiQsUUMI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2008 reg.exe 1720 reg.exe 568 reg.exe 980 reg.exe 1716 reg.exe 1324 reg.exe 1868 reg.exe 2028 reg.exe 2032 reg.exe 1960 reg.exe 1608 reg.exe 1476 reg.exe 1732 reg.exe 1552 reg.exe 1092 reg.exe 948 reg.exe 360 reg.exe 1312 reg.exe 2020 reg.exe 1916 reg.exe 1324 reg.exe 1684 reg.exe 1320 reg.exe 1212 reg.exe 1524 reg.exe 2028 reg.exe 1156 reg.exe 1312 reg.exe 1056 reg.exe 1148 reg.exe 1616 reg.exe 956 reg.exe 532 reg.exe 1680 reg.exe 1128 reg.exe 1048 reg.exe 1608 reg.exe 1800 reg.exe 1504 reg.exe 1672 reg.exe 1072 reg.exe 1720 reg.exe 1544 reg.exe 2044 reg.exe 1500 reg.exe 1676 reg.exe 1632 reg.exe 1976 reg.exe 1904 reg.exe 1908 reg.exe 1720 reg.exe 924 reg.exe 1672 reg.exe 1012 reg.exe 1536 reg.exe 1148 reg.exe 1204 reg.exe 1780 reg.exe 1476 reg.exe 1676 reg.exe 1048 reg.exe 1696 reg.exe 1476 reg.exe 604 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1216 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1216 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1720 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1720 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1924 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1924 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1076 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1076 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 296 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 296 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1960 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1960 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1716 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1716 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1672 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1672 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1608 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1608 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1012 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1012 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 2008 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 2008 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 296 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 296 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1908 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1908 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1128 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1128 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1896 cscript.exe 1896 cscript.exe 772 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 772 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1636 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1636 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1912 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1912 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 552 conhost.exe 552 conhost.exe 1464 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1464 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1628 conhost.exe 1628 conhost.exe 1980 cscript.exe 1980 cscript.exe 904 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 904 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1920 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1920 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1484 cmd.exe 1484 cmd.exe 1824 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1824 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1976 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1976 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 784 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 784 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 1020 cmd.exe 1020 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 816 PiQsUUMI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe 816 PiQsUUMI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 816 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 27 PID 1448 wrote to memory of 816 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 27 PID 1448 wrote to memory of 816 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 27 PID 1448 wrote to memory of 816 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 27 PID 1448 wrote to memory of 1704 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 28 PID 1448 wrote to memory of 1704 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 28 PID 1448 wrote to memory of 1704 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 28 PID 1448 wrote to memory of 1704 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 28 PID 1448 wrote to memory of 1056 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 30 PID 1448 wrote to memory of 1056 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 30 PID 1448 wrote to memory of 1056 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 30 PID 1448 wrote to memory of 1056 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 30 PID 1056 wrote to memory of 1696 1056 cmd.exe 32 PID 1056 wrote to memory of 1696 1056 cmd.exe 32 PID 1056 wrote to memory of 1696 1056 cmd.exe 32 PID 1056 wrote to memory of 1696 1056 cmd.exe 32 PID 1448 wrote to memory of 1552 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 33 PID 1448 wrote to memory of 1552 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 33 PID 1448 wrote to memory of 1552 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 33 PID 1448 wrote to memory of 1552 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 33 PID 1448 wrote to memory of 1800 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 34 PID 1448 wrote to memory of 1800 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 34 PID 1448 wrote to memory of 1800 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 34 PID 1448 wrote to memory of 1800 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 34 PID 1448 wrote to memory of 1616 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 36 PID 1448 wrote to memory of 1616 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 36 PID 1448 wrote to memory of 1616 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 36 PID 1448 wrote to memory of 1616 1448 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 36 PID 1696 wrote to memory of 1956 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 39 PID 1696 wrote to memory of 1956 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 39 PID 1696 wrote to memory of 1956 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 39 PID 1696 wrote to memory of 1956 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 39 PID 1956 wrote to memory of 1216 1956 cmd.exe 41 PID 1956 wrote to memory of 1216 1956 cmd.exe 41 PID 1956 wrote to memory of 1216 1956 cmd.exe 41 PID 1956 wrote to memory of 1216 1956 cmd.exe 41 PID 1696 wrote to memory of 976 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 42 PID 1696 wrote to memory of 976 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 42 PID 1696 wrote to memory of 976 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 42 PID 1696 wrote to memory of 976 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 42 PID 1696 wrote to memory of 2032 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 43 PID 1696 wrote to memory of 2032 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 43 PID 1696 wrote to memory of 2032 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 43 PID 1696 wrote to memory of 2032 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 43 PID 1696 wrote to memory of 1476 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 47 PID 1696 wrote to memory of 1476 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 47 PID 1696 wrote to memory of 1476 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 47 PID 1696 wrote to memory of 1476 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 47 PID 1696 wrote to memory of 1648 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 51 PID 1696 wrote to memory of 1648 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 51 PID 1696 wrote to memory of 1648 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 51 PID 1696 wrote to memory of 1648 1696 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 51 PID 1216 wrote to memory of 1812 1216 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 48 PID 1216 wrote to memory of 1812 1216 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 48 PID 1216 wrote to memory of 1812 1216 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 48 PID 1216 wrote to memory of 1812 1216 f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe 48 PID 1812 wrote to memory of 1720 1812 cmd.exe 52 PID 1812 wrote to memory of 1720 1812 cmd.exe 52 PID 1812 wrote to memory of 1720 1812 cmd.exe 52 PID 1812 wrote to memory of 1720 1812 cmd.exe 52 PID 1648 wrote to memory of 956 1648 cmd.exe 53 PID 1648 wrote to memory of 956 1648 cmd.exe 53 PID 1648 wrote to memory of 956 1648 cmd.exe 53 PID 1648 wrote to memory of 956 1648 cmd.exe 53 -
System policy modification 1 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe"C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\sgoMMggU\PiQsUUMI.exe"C:\Users\Admin\sgoMMggU\PiQsUUMI.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:816
-
-
C:\ProgramData\mYUEkcMg\ywsoQUYU.exe"C:\ProgramData\mYUEkcMg\ywsoQUYU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1704
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f03⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"4⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f05⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"6⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f07⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"8⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f09⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"10⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f011⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"12⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f013⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"14⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f015⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"16⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f017⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"18⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f019⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"20⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f021⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"22⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f023⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"24⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f025⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"26⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f027⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"28⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f029⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"30⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f031⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"32⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f033⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"34⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f035⤵PID:1896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"36⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f037⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"38⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f039⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"40⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f041⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"42⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f043⤵PID:552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"44⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f045⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"46⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:832 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f047⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"48⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f049⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"50⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f051⤵
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"52⤵
- Modifies visibility of file extensions in Explorer
PID:532 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f053⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"54⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f055⤵PID:1484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"56⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f057⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"58⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f059⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"60⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f061⤵
- Suspicious behavior: EnumeratesProcesses
PID:784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"62⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f063⤵PID:1020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"64⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f065⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"66⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f067⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"68⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f069⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"70⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f071⤵
- Modifies visibility of file extensions in Explorer
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"72⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f073⤵PID:1448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"74⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f075⤵PID:1892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"76⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f077⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"78⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f079⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"80⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f081⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"82⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f083⤵PID:2012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"84⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f085⤵PID:1896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"86⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f087⤵PID:1908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0"88⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exeC:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f089⤵PID:1116
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵PID:1092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1780
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- UAC bypass
- Modifies registry key
PID:1204
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SQssYEgU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""88⤵PID:1820
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵PID:1936
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1504
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵PID:1060
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
- Modifies registry key
PID:1672
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wekgkQUU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""86⤵PID:1812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵PID:368
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
PID:580
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
PID:1148
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- UAC bypass
- Modifies registry key
PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zskoMogQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""84⤵PID:1156
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵PID:604
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1916
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
- Modifies registry key
PID:1324
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:1732
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vQcYcQQE.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""82⤵PID:368
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵PID:1476
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
- Modifies registry key
PID:924
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- UAC bypass
PID:1048
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oSUMEQkU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""80⤵PID:1728
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:748
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
- Modifies visibility of file extensions in Explorer
PID:1956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵PID:436
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
- Modifies registry key
PID:1632
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CqAUoEgU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""78⤵PID:1920
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1868
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1312
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
- Modifies registry key
PID:2020
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵PID:1716
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tWUcwQwU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""76⤵PID:1340
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵PID:368
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
PID:620
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- Modifies registry key
PID:1868
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
PID:1156
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cOkgYwQE.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""74⤵PID:2012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵PID:1948
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- UAC bypass
PID:1732
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- Modifies registry key
PID:1324
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
PID:1056
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GWQoQQsk.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""72⤵PID:812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:1608
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RYEoYcAU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""70⤵PID:1524
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵PID:924
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- Modifies registry key
PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
- Modifies registry key
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵PID:604
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:1536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
- Modifies registry key
PID:1676
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
- Modifies registry key
PID:1800
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JegMskoQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""68⤵PID:1696
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵PID:568
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
PID:1048
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ukQcAIoc.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""66⤵PID:620
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵PID:1732
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
PID:1716
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵PID:1928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵PID:368
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PYYwIAwQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""64⤵PID:1632
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:832
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵PID:1540
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1092
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
PID:952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TOQwQQkQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""62⤵PID:604
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
- Modifies registry key
PID:1524
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
- Modifies registry key
PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qiYYUAQw.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""60⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:620
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs62⤵
- Modifies visibility of file extensions in Explorer
PID:1544
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies visibility of file extensions in Explorer
PID:1900
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵PID:1580
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵PID:1320
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- UAC bypass
- Modifies registry key
PID:2044
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cogYIkAo.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""58⤵PID:976
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:296
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- UAC bypass
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
PID:1916
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zcggMcgQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""56⤵PID:2012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵PID:1732
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵PID:1572
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2028
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uKEUMIwM.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""54⤵PID:1716
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:580
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- UAC bypass
- Modifies registry key
PID:1312
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies registry key
PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
PID:1820
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gaMgEUgY.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""52⤵PID:1696
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:1672
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵PID:1324
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:840
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nKQgAUkE.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""50⤵PID:1012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:1048
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵PID:1764
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hyIckgAE.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""48⤵PID:748
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:1020
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- Modifies registry key
PID:1908
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1608
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵PID:532
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
- Modifies registry key
PID:1048
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GMsEEowE.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""46⤵PID:1500
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:1904
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
PID:1624
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OygEYwoc.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""44⤵PID:608
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:1092
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- Modifies registry key
PID:604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
- UAC bypass
PID:2044
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- Modifies registry key
PID:1212
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HicQgwIQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""42⤵PID:840
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:1684
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:620
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1608
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1056
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵PID:976
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵PID:832
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\iGAQwQIc.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""40⤵PID:1980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1320
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:368
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\MOkwcQkA.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""38⤵PID:1676
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:1552
-
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:604
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:1608
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
PID:1960
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
- Modifies registry key
PID:980
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VgEEkUMw.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""36⤵PID:1464
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:1096
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
PID:956
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
- Modifies registry key
PID:1684
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nUAwocIo.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""34⤵PID:1648
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:964
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:1696
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1904
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:368
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- UAC bypass
PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wcsAAcEA.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""32⤵PID:832
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:952
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:1528
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
- Modifies registry key
PID:1680
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
- Modifies registry key
PID:2032
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lMUcAscU.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""30⤵PID:552
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:1672
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:1576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
- Modifies registry key
PID:568
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zSsEkQIQ.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""28⤵PID:1980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:772
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
- Modifies registry key
PID:360
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cUUwwIgM.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""26⤵PID:832
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:2020
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
PID:1820
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵PID:580
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:532
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
- Modifies registry key
PID:1696
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KCgAoUwA.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""24⤵PID:1728
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:1736
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
PID:1956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:1892
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
- Modifies registry key
PID:1148
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FkckUQcc.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""22⤵PID:1980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:976
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:1896
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- UAC bypass
PID:1020
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dUcwgAIo.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""20⤵PID:1948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:1960
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1128
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:1924
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- Modifies registry key
PID:1048
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mCMYcIgY.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""18⤵PID:580
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:840
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1676
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:1500
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
PID:860
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hcwYUIQI.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""16⤵PID:1800
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:1204
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:1552
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:1924
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
PID:1916
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rcMEUYQc.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""14⤵PID:1072
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:1952
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:1800
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:1964
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AWkwwkMY.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""12⤵PID:1656
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:1544
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:1648
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:1536
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KUkgEkQk.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""10⤵PID:924
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:748
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:1072
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:904
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:2028
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\fEYkYgAY.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""8⤵PID:784
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:1204
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:948
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:1212
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:1672
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RGEQAYww.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""6⤵PID:1632
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:980
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:1476
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ISckcYgw.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:956
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1552
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1800
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:1616
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SwwgMIoY.bat" "C:\Users\Admin\AppData\Local\Temp\f9c4fbe57e73531e344e7d96acc8222d27c04c0a4c1bfb7be5f03d95f0e262f0.exe""2⤵PID:1672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:568
-
-
-
C:\ProgramData\woIkAIYg\uaIsUoEA.exeC:\ProgramData\woIkAIYg\uaIsUoEA.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1100
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "63608369280060621881343260415734906121302673414654274311236857986599465419"1⤵
- Modifies visibility of file extensions in Explorer
PID:580
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "443843871789840824-1337800322-1385414281-323119655148089082218876957301674330322"1⤵PID:1648
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1120680949627774142-35171697021188690321728881070-39052953867219280-1114219251"1⤵PID:924
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-356878009-1403438441991384386-1732971211-14918366474955096951865430117-1416815676"1⤵
- UAC bypass
PID:1212
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2136089285-1045751785-2015038741-14759087292046074797532848626-15928546661999751340"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1782010187-653591285940944719166898121210645469631276540118-865001524-485707201"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-819357659-1250337022-312413297-19043641584244994061554384362909300878963581539"1⤵
- UAC bypass
PID:1048
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "653686378428669106-11557323441006197691-14501582491902524301-1802817148830420649"1⤵
- UAC bypass
PID:1908
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-102723019476559008-1386448196-1045258989-18301757121688279679-1438122872-259922513"1⤵
- Modifies visibility of file extensions in Explorer
PID:1684
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "767533143442499611577524319-194102537253097284716551770431501237054-41784911"1⤵PID:1320
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1766402571-9934028791698315534-355058650-379324119-630450430824916196991857404"1⤵PID:532
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1418083428-9445876312713317531723393032-187335021-1802121780-1435097857-632522182"1⤵PID:1012
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "15177948671055490445-172492730647263812427259027542151530283269822388379396"1⤵PID:1324
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-7632213891853102958-27300410-1263929244886967981-18553683261254524965650011035"1⤵PID:1672
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "117759545-878508781-694208722228972494891546260722936479627614441-1838564782"1⤵PID:296
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1897560490-1996190359-1558182952-1211675781-111346107-20651240461772728424-680086592"1⤵
- Modifies visibility of file extensions in Explorer
PID:1728
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "408503005-176569713412006696271250538634257950573-691862039-804843337-1169915845"1⤵PID:832
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "602510092786784319-207986302-1376404768-1380051245193610391919014781851118784935"1⤵PID:580
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-694251323-370650528-1891123464-1321149181-60140162216871823742064614135174129160"1⤵PID:1204
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "7587800577732285712046801054-8298191791690534657-120816716525990008315893939"1⤵
- Modifies visibility of file extensions in Explorer
PID:1580
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-12181067131086374239-5992279961633550627-18640073352961996251114078310370857280"1⤵PID:568
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1551095594384240684-336599095-35653355615824070571386068767-1418981712-1602468272"1⤵PID:1936
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1761991644-1375015425-1044083136-33896186418575846861449825006-20598330802002412890"1⤵PID:1484
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1108796414-195511031-1369264046194103071854829445-1374856041-2028838710-1479763745"1⤵PID:1544
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "126991109-11709782842014780661-27776077560587561715814934991332552761-211626090"1⤵PID:1968
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1668667364-588815271-19864895681403093044-314895587-20051397501779787352-1039473991"1⤵
- Modifies visibility of file extensions in Explorer
PID:604
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "735492135-161285930-1791348683-1019369802-787059925-30113925-1672968390-171621949"1⤵PID:1524
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "51417617-3138892492048973817-7480894821133313001283053812-922401941284264729"1⤵PID:1928
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-914018211-1574975651-2101511179965121322-1611501300-2118546061-1800775117-1051070877"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD583f7c72e658b8192130d80610c07bca5
SHA1769f8ce02b9652198cb21fbc52c7e854528afdff
SHA256252d8401cbec1d722e54899187236c6fa591ca8f62402c2799d57f098ef0951c
SHA51287f4b27974562e24886b6418527386b1a29acf385dbd174e969500a852c29b92338f34bebb8a3dff43c72b9e88e5dbc321207dda535d57cf37abcfc5fa9a1f6e
-
Filesize
431KB
MD54a69bb6479e199445c2563ad60e3e6d9
SHA1339d4a45fde0ff804487a6976d8923a85f14d36a
SHA256b7655c6803f44819e8b655f8cee94e30cfb3edd0ecf595b5f6fa2a84c8f5c40b
SHA512dae511d8ede975c8ae5e1596c2c2514be5ff01586434cf7db19fa1ecd9db5c0c4ae25863f2ebd4980672e6ebfad861289f566d676e83bd25ec6c3298ab9967d9
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
6KB
MD5a137db26123ef0010b9a5a32a99280dc
SHA15bf02a4fb41d55ec25ba5ae0d884a6f27427f3e6
SHA256ba3f69d25e4e77c54b430ccb1cd5af85fff66ec22689f0db6a9bed4fe3733bfd
SHA512b5b971b7ed99c5682896e8bbfd1aaf93e0a72aa7a4219f93908b98770a0104c6bfd81f6d0b15588a6aceffd99fa305cff0ba4946a6a27675804a273598b83e2f
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
429KB
MD55e4a1652c6ba00483c0262067524a13e
SHA1990c53b98aaef2f3a02fb8a4c324ae907b2a1148
SHA25650fa47489ea9b3cdc46c9a9fbea618afe5fcd07e7f1e9d95bb11f4d6af8f66d7
SHA51299fda0476d992a6dfa10a08ea41c2deda13b94615701b657050de3c4cb37096f4704ad41bee8746f57fd1d3232a52bb662f653f270cb7f6d6f65bd54c0106706
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
429KB
MD583f7c72e658b8192130d80610c07bca5
SHA1769f8ce02b9652198cb21fbc52c7e854528afdff
SHA256252d8401cbec1d722e54899187236c6fa591ca8f62402c2799d57f098ef0951c
SHA51287f4b27974562e24886b6418527386b1a29acf385dbd174e969500a852c29b92338f34bebb8a3dff43c72b9e88e5dbc321207dda535d57cf37abcfc5fa9a1f6e
-
Filesize
429KB
MD583f7c72e658b8192130d80610c07bca5
SHA1769f8ce02b9652198cb21fbc52c7e854528afdff
SHA256252d8401cbec1d722e54899187236c6fa591ca8f62402c2799d57f098ef0951c
SHA51287f4b27974562e24886b6418527386b1a29acf385dbd174e969500a852c29b92338f34bebb8a3dff43c72b9e88e5dbc321207dda535d57cf37abcfc5fa9a1f6e
-
Filesize
429KB
MD55e4a1652c6ba00483c0262067524a13e
SHA1990c53b98aaef2f3a02fb8a4c324ae907b2a1148
SHA25650fa47489ea9b3cdc46c9a9fbea618afe5fcd07e7f1e9d95bb11f4d6af8f66d7
SHA51299fda0476d992a6dfa10a08ea41c2deda13b94615701b657050de3c4cb37096f4704ad41bee8746f57fd1d3232a52bb662f653f270cb7f6d6f65bd54c0106706
-
Filesize
429KB
MD55e4a1652c6ba00483c0262067524a13e
SHA1990c53b98aaef2f3a02fb8a4c324ae907b2a1148
SHA25650fa47489ea9b3cdc46c9a9fbea618afe5fcd07e7f1e9d95bb11f4d6af8f66d7
SHA51299fda0476d992a6dfa10a08ea41c2deda13b94615701b657050de3c4cb37096f4704ad41bee8746f57fd1d3232a52bb662f653f270cb7f6d6f65bd54c0106706