Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe
Resource
win10v2004-20220901-en
General
-
Target
d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe
-
Size
492KB
-
MD5
4eb5be7f87137811f9e55a83bf95e3d0
-
SHA1
ca89b0a1f1d613bff213c2c7dc597d57d88c1813
-
SHA256
d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9
-
SHA512
2e2618a418be0dcf7b923916e94544579796a886a64328c29e6f71aa8c2819874f4ff0bcda57b8821509cd7bc5f72f3496f4a826c76c09c931ba56c3a297710b
-
SSDEEP
12288:lLtgxznVuRH2pGKz2Bnk0BaWmaUZeuDrG7bua7ioQ81/OvS7Fo77ZmzJc:lKxUs2lk8aWJoUrz+77F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe,C:\\ProgramData\\kCwEsIQk\\dAQMMwcU.exe," d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe," d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe," d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe,C:\\ProgramData\\kCwEsIQk\\dAQMMwcU.exe," d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3484 TsMMwYIA.exe 3516 NqYsUogs.exe 208 eegAgIIs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation NqYsUogs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TsMMwYIA.exe = "C:\\Users\\Admin\\VowsIIAg\\TsMMwYIA.exe" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NqYsUogs.exe = "C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TsMMwYIA.exe = "C:\\Users\\Admin\\VowsIIAg\\TsMMwYIA.exe" TsMMwYIA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NqYsUogs.exe = "C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe" NqYsUogs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NqYsUogs.exe = "C:\\ProgramData\\BgEEoQgE\\NqYsUogs.exe" eegAgIIs.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KMsYMMsk.exe = "C:\\Users\\Admin\\bGQIYkgg\\KMsYMMsk.exe" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dAQMMwcU.exe = "C:\\ProgramData\\kCwEsIQk\\dAQMMwcU.exe" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\VowsIIAg\TsMMwYIA eegAgIIs.exe File created C:\Windows\SysWOW64\shell32.dll.exe NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\sheSelectSync.png NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\sheSwitchUnregister.xlsb NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\VowsIIAg eegAgIIs.exe File opened for modification C:\Windows\SysWOW64\sheEnableNew.gif NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\shePingDebug.pptx NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\sheStepBlock.ppt NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\sheSubmitInstall.xlsx NqYsUogs.exe File opened for modification C:\Windows\SysWOW64\sheUnregisterSet.zip NqYsUogs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4604 4036 WerFault.exe 444 3268 1392 WerFault.exe 446 4304 4884 WerFault.exe 449 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4548 reg.exe 2188 reg.exe 2296 reg.exe 4268 reg.exe 4128 reg.exe 3988 reg.exe 916 reg.exe 3276 reg.exe 3704 reg.exe 684 reg.exe 1352 reg.exe 3756 reg.exe 4836 reg.exe 1196 reg.exe 5004 reg.exe 1692 reg.exe 3880 reg.exe 2792 reg.exe 4724 reg.exe 1944 reg.exe 1996 reg.exe 916 reg.exe 816 reg.exe 844 reg.exe 2096 reg.exe 816 reg.exe 1880 reg.exe 2980 reg.exe 1644 reg.exe 872 reg.exe 5092 reg.exe 2980 reg.exe 1868 reg.exe 1396 reg.exe 1096 reg.exe 3168 reg.exe 3564 reg.exe 4848 reg.exe 3160 reg.exe 2588 reg.exe 4200 reg.exe 4740 reg.exe 4648 reg.exe 4684 reg.exe 448 reg.exe 4132 reg.exe 2792 reg.exe 1868 reg.exe 2720 reg.exe 3108 reg.exe 4244 reg.exe 4580 reg.exe 3760 reg.exe 696 reg.exe 552 reg.exe 4700 reg.exe 1692 reg.exe 2296 reg.exe 2212 reg.exe 4060 reg.exe 4708 reg.exe 1376 reg.exe 1664 reg.exe 1988 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3184 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3184 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3184 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3184 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1868 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1868 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1868 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1868 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 1504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2232 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2232 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2232 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2232 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4036 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4036 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4036 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4036 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4732 reg.exe 4732 reg.exe 4732 reg.exe 4732 reg.exe 1600 Conhost.exe 1600 Conhost.exe 1600 Conhost.exe 1600 Conhost.exe 3212 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3212 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3212 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 3212 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4736 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4736 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4736 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4736 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4380 Conhost.exe 4380 Conhost.exe 4380 Conhost.exe 4380 Conhost.exe 4004 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4004 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4004 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 4004 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2376 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2376 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2376 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 2376 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3516 NqYsUogs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe 3516 NqYsUogs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3484 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 87 PID 5084 wrote to memory of 3484 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 87 PID 5084 wrote to memory of 3484 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 87 PID 5084 wrote to memory of 3516 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 88 PID 5084 wrote to memory of 3516 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 88 PID 5084 wrote to memory of 3516 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 88 PID 5084 wrote to memory of 5056 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 90 PID 5084 wrote to memory of 5056 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 90 PID 5084 wrote to memory of 5056 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 90 PID 5084 wrote to memory of 1396 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 92 PID 5084 wrote to memory of 1396 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 92 PID 5084 wrote to memory of 1396 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 92 PID 5084 wrote to memory of 2196 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 97 PID 5084 wrote to memory of 2196 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 97 PID 5084 wrote to memory of 2196 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 97 PID 5084 wrote to memory of 4848 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 95 PID 5084 wrote to memory of 4848 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 95 PID 5084 wrote to memory of 4848 5084 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 95 PID 5056 wrote to memory of 3692 5056 cmd.exe 98 PID 5056 wrote to memory of 3692 5056 cmd.exe 98 PID 5056 wrote to memory of 3692 5056 cmd.exe 98 PID 3692 wrote to memory of 4744 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 99 PID 3692 wrote to memory of 4744 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 99 PID 3692 wrote to memory of 4744 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 99 PID 3692 wrote to memory of 844 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 101 PID 3692 wrote to memory of 844 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 101 PID 3692 wrote to memory of 844 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 101 PID 3692 wrote to memory of 4656 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 102 PID 3692 wrote to memory of 4656 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 102 PID 3692 wrote to memory of 4656 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 102 PID 3692 wrote to memory of 2096 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 103 PID 3692 wrote to memory of 2096 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 103 PID 3692 wrote to memory of 2096 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 103 PID 3692 wrote to memory of 4704 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 104 PID 3692 wrote to memory of 4704 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 104 PID 3692 wrote to memory of 4704 3692 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 104 PID 4744 wrote to memory of 3504 4744 cmd.exe 109 PID 4744 wrote to memory of 3504 4744 cmd.exe 109 PID 4744 wrote to memory of 3504 4744 cmd.exe 109 PID 4704 wrote to memory of 5112 4704 cmd.exe 110 PID 4704 wrote to memory of 5112 4704 cmd.exe 110 PID 4704 wrote to memory of 5112 4704 cmd.exe 110 PID 3504 wrote to memory of 2448 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 111 PID 3504 wrote to memory of 2448 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 111 PID 3504 wrote to memory of 2448 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 111 PID 2448 wrote to memory of 4224 2448 cmd.exe 114 PID 2448 wrote to memory of 4224 2448 cmd.exe 114 PID 2448 wrote to memory of 4224 2448 cmd.exe 114 PID 3504 wrote to memory of 3844 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 113 PID 3504 wrote to memory of 3844 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 113 PID 3504 wrote to memory of 3844 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 113 PID 3504 wrote to memory of 1096 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 115 PID 3504 wrote to memory of 1096 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 115 PID 3504 wrote to memory of 1096 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 115 PID 3504 wrote to memory of 3160 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 118 PID 3504 wrote to memory of 3160 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 118 PID 3504 wrote to memory of 3160 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 118 PID 3504 wrote to memory of 872 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 119 PID 3504 wrote to memory of 872 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 119 PID 3504 wrote to memory of 872 3504 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 119 PID 4224 wrote to memory of 4268 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 122 PID 4224 wrote to memory of 4268 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 122 PID 4224 wrote to memory of 4268 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 122 PID 4224 wrote to memory of 2880 4224 d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe 124 -
System policy modification 1 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe"C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\VowsIIAg\TsMMwYIA.exe"C:\Users\Admin\VowsIIAg\TsMMwYIA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3484
-
-
C:\ProgramData\BgEEoQgE\NqYsUogs.exe"C:\ProgramData\BgEEoQgE\NqYsUogs.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"2⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde93⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"4⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde95⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"6⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde97⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"8⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde99⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"10⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde911⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"12⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde913⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"14⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde915⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"16⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde917⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"18⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde919⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"20⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde921⤵PID:1600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"22⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde923⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"24⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde925⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"26⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde927⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"28⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde929⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"30⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde931⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"32⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde933⤵
- Modifies visibility of file extensions in Explorer
PID:1644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"34⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde935⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:4036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"36⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde937⤵
- Modifies visibility of file extensions in Explorer
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"38⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde939⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"40⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde941⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"42⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde943⤵PID:1396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"44⤵PID:424
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde945⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"46⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde947⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"48⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde949⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"50⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde951⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"52⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde953⤵PID:1176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"54⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde955⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"56⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde957⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"58⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde959⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:4544 -
C:\Users\Admin\bGQIYkgg\KMsYMMsk.exe"C:\Users\Admin\bGQIYkgg\KMsYMMsk.exe"60⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 28461⤵
- Program crash
PID:4604
-
-
-
C:\ProgramData\kCwEsIQk\dAQMMwcU.exe"C:\ProgramData\kCwEsIQk\dAQMMwcU.exe"60⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 39261⤵
- Program crash
PID:3268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"60⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde961⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"62⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde963⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"64⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde965⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"66⤵PID:884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde967⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"68⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde969⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"70⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde971⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"72⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde973⤵
- Modifies visibility of file extensions in Explorer
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"74⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde975⤵PID:3184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"76⤵PID:3480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde977⤵
- Modifies visibility of file extensions in Explorer
PID:3820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"78⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde979⤵PID:1376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"80⤵PID:3804
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde981⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9"82⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exeC:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde983⤵PID:4680
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- UAC bypass
PID:4564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
PID:2296
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1868
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵PID:3844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xeoMscEA.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""82⤵PID:1536
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵PID:4884
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- UAC bypass
PID:1932
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3108
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hAEgYkgo.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""80⤵PID:1524
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:3184
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- UAC bypass
- Modifies registry key
PID:1352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
- Modifies registry key
PID:3564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
PID:4408
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:816 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XmwoIQUI.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""78⤵PID:2156
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵PID:820
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
PID:5064
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵PID:1544
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
- Modifies registry key
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IMgsksko.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""76⤵PID:440
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵PID:3560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵PID:884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵
- Modifies visibility of file extensions in Explorer
PID:2212
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:916 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵
- Modifies visibility of file extensions in Explorer
PID:3880
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- UAC bypass
- Modifies registry key
PID:5092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
PID:696
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
PID:1644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cyAggocE.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""74⤵PID:2004
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵PID:3180
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gackkEQQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""72⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1196 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:2044
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
PID:1692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- Modifies registry key
PID:4700
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:872
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SuQwMMgw.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""70⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2880 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3064
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- UAC bypass
- Modifies registry key
PID:3168
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
- Modifies registry key
PID:816
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
- Modifies visibility of file extensions in Explorer
PID:4244
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:4640 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵
- Modifies visibility of file extensions in Explorer
PID:504
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aCkskUEY.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""68⤵PID:4368
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4740
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:448
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- UAC bypass
- Modifies registry key
PID:4684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XOIcUMoQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""66⤵PID:3932
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵PID:1068
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵PID:1672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4060
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zMEIYYgg.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""64⤵PID:3216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵
- UAC bypass
PID:2188
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:4944
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- Modifies registry key
PID:1196
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies registry key
PID:2720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4648
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
PID:4340
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:3140
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jMUccYMA.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""62⤵PID:1544
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:3136
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- Modifies registry key
PID:916
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵PID:4564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵PID:504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CMMwggAA.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""60⤵PID:1244
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:3160
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YGUAMIkQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""58⤵
- Modifies visibility of file extensions in Explorer
PID:4292 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:4708
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- Modifies registry key
PID:1692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
- Modifies registry key
PID:3988 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:1664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies registry key
PID:552
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zmsQUoYM.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""56⤵PID:4124
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2296
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
- Modifies registry key
PID:1996
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
PID:3704
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies registry key
PID:3880
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵PID:4308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
- Modifies visibility of file extensions in Explorer
PID:4732
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵PID:504
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- Modifies registry key
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TmYEckUU.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""54⤵PID:2444
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:4396
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies registry key
PID:2212
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- UAC bypass
PID:684 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:4016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵PID:3064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tOMkYIIs.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""52⤵PID:3032
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:1408
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
PID:1372
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:3852
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DYwsYcoA.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""50⤵PID:5076
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:3988
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵PID:448
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
PID:3760
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- UAC bypass
PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\icoIgAoQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""48⤵PID:4312
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:3216
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:820
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵PID:3820
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵PID:3816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aYAUAogQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""46⤵PID:4388
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:3588
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
- Modifies registry key
PID:2980
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:2792
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:3184
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- UAC bypass
- Modifies registry key
PID:4724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VUYYIgok.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""44⤵PID:3908
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:4304
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- Modifies registry key
PID:2296
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
- Modifies registry key
PID:2588 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\duQwUckI.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""42⤵PID:4596
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:4016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
PID:1912
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵PID:4292
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:1664 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lCoswocU.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""40⤵PID:4620
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:3852
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
PID:4264
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SMwAgIwM.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""38⤵PID:4544
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:1120
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- Modifies registry key
PID:2188
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:1128
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
PID:4900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UusgQoAM.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""36⤵PID:2096
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:3848
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
PID:4252 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:4588
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
PID:1852
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:1836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TMQgkUwM.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""34⤵PID:4848
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:3480
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
PID:2004 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:3032
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BUAAcMMQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""32⤵PID:1248
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:3016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
PID:684
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
- Modifies registry key
PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qQcooMMs.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""30⤵PID:2284
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:4596
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
PID:3044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
- Modifies registry key
PID:3756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:1112
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SewQkcIc.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""28⤵PID:4744
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:4376
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
- Modifies registry key
PID:4128
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:4204
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1868
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
PID:4032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TqUUswoI.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""26⤵PID:4944
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:4732
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵PID:4036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:3184
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies registry key
PID:1644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TMIooQQo.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""24⤵PID:2188
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:3032
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
- Modifies registry key
PID:1880
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:5004 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:4580
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies registry key
PID:1096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ogcockcE.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""22⤵PID:4648
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:4396
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
PID:2792
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
PID:1692
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵PID:4776
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- UAC bypass
PID:552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wuAsMUAA.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""20⤵PID:2440
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:2020
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:3692
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3276
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:204
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
PID:4268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zWMwwgYM.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""18⤵PID:4008
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:3044
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:2880
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:4580
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
- Modifies registry key
PID:1376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RicYgEck.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""16⤵PID:3216
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:4880
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:4664
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:3504
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KgskYIsQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""14⤵PID:1320
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:1404
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:4244
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\owsIYkkQ.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""12⤵PID:3588
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:3148
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵PID:4884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:4132
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tsoUwIoY.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""10⤵PID:4544
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:2196
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:2880
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:684
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:4708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hysMwwQM.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""8⤵PID:4480
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4732
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:3844
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:1096
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:3160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sOIEEYUk.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""6⤵PID:872
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:3480
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:844
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:4656
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WwMsgkYI.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:5112
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1396
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:4848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\peMYoAEc.bat" "C:\Users\Admin\AppData\Local\Temp\d1acc303342b1b11008185659806a4827a182d1b04f3b546dbecf636abfadde9.exe""2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3816 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3136
-
-
-
C:\ProgramData\CaYYcwko\eegAgIIs.exeC:\ProgramData\CaYYcwko\eegAgIIs.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:1512
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4036 -ip 40361⤵PID:1672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1392 -ip 13921⤵PID:4664
-
C:\ProgramData\DgAwksMc\ZWUoIoos.exeC:\ProgramData\DgAwksMc\ZWUoIoos.exe1⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 2802⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4884 -ip 48841⤵PID:4392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481KB
MD59493806093767729dae599995756268e
SHA13dc07faf505d5e35210fca736a509e347d332385
SHA256ebdc62ec913e8d149edb5c1cd77394c1584e12a7b3d3708579d3d94e29773a59
SHA512708b8df4170827581bd347f11fe0bf0bdf5db2f36778429b9c18639220b5587cde9c7a1a1a9295a4de3bcaa5ca1edd7014e65ec20918f1f80b6e8e01543253fb
-
Filesize
481KB
MD59493806093767729dae599995756268e
SHA13dc07faf505d5e35210fca736a509e347d332385
SHA256ebdc62ec913e8d149edb5c1cd77394c1584e12a7b3d3708579d3d94e29773a59
SHA512708b8df4170827581bd347f11fe0bf0bdf5db2f36778429b9c18639220b5587cde9c7a1a1a9295a4de3bcaa5ca1edd7014e65ec20918f1f80b6e8e01543253fb
-
Filesize
480KB
MD5e66525063c00b84802f75b15ab529844
SHA1c84b626f8c7420ad1f2b7c5fd8a9f8e277d4a19a
SHA2567550436887e9fac6a1c4e4d1d40093423376e04e263e9d3aa53493aa5b55bdee
SHA512a50c697834d8ead1a807c6204f7104569cdb522b7e0258f23c800304ab1c06f0f47d2a6d10854cde9a21e92428543f0a9afef3a4a1490a4611e79d4cf91ed757
-
Filesize
480KB
MD5e66525063c00b84802f75b15ab529844
SHA1c84b626f8c7420ad1f2b7c5fd8a9f8e277d4a19a
SHA2567550436887e9fac6a1c4e4d1d40093423376e04e263e9d3aa53493aa5b55bdee
SHA512a50c697834d8ead1a807c6204f7104569cdb522b7e0258f23c800304ab1c06f0f47d2a6d10854cde9a21e92428543f0a9afef3a4a1490a4611e79d4cf91ed757
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
483KB
MD5fddf854213977bf3d7c0527da16174ec
SHA17bc37a7f6020335fc2ed7d66e1d9ca2c5341ff54
SHA25636582dceca3f75007cef4ee3a106310f61ad6b2fbbff7fbbc3421e611fa2cc5d
SHA51212b31bbb30f3d353a6c34c53e5080ae0aeb1e9ed74df4413f67dee3daa277cf10f98f8792ed2797e29cc66134e680d71cd50bc12a8467b603ec9cfe432ab0dfb
-
Filesize
483KB
MD5fddf854213977bf3d7c0527da16174ec
SHA17bc37a7f6020335fc2ed7d66e1d9ca2c5341ff54
SHA25636582dceca3f75007cef4ee3a106310f61ad6b2fbbff7fbbc3421e611fa2cc5d
SHA51212b31bbb30f3d353a6c34c53e5080ae0aeb1e9ed74df4413f67dee3daa277cf10f98f8792ed2797e29cc66134e680d71cd50bc12a8467b603ec9cfe432ab0dfb