Analysis
-
max time kernel
162s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe
Resource
win10v2004-20220901-en
General
-
Target
48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe
-
Size
463KB
-
MD5
717d98f84f555c5e77347d5f0fb95880
-
SHA1
857c12dc18d15b3a13183c4b2533ce3811af0c90
-
SHA256
48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82
-
SHA512
e9c7e485e90500ada4f1b1d31b6785e9b283415871352d5b897f70eb795631708dc9f86523bd22b054adbdbc0b4921535841e6c0ed79de460741f213f528dcd2
-
SSDEEP
12288:sf/x+yaVvIrrIFh5DKK0LEsejp4OsbZJtrC4:2rWvWMFifLEhjpZstO4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 54 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3664 xoMQsIcw.exe 3740 jwosUEsM.exe 3300 HEMMQQQA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation xoMQsIcw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dAQMMwcU.exe = "C:\\ProgramData\\kCwEsIQk\\dAQMMwcU.exe" 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoMQsIcw.exe = "C:\\Users\\Admin\\UWocMoAU\\xoMQsIcw.exe" 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jwosUEsM.exe = "C:\\ProgramData\\oaEgoEIs\\jwosUEsM.exe" 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoMQsIcw.exe = "C:\\Users\\Admin\\UWocMoAU\\xoMQsIcw.exe" xoMQsIcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jwosUEsM.exe = "C:\\ProgramData\\oaEgoEIs\\jwosUEsM.exe" jwosUEsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jwosUEsM.exe = "C:\\ProgramData\\oaEgoEIs\\jwosUEsM.exe" HEMMQQQA.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KMsYMMsk.exe = "C:\\Users\\Admin\\bGQIYkgg\\KMsYMMsk.exe" 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\UWocMoAU\xoMQsIcw HEMMQQQA.exe File created C:\Windows\SysWOW64\shell32.dll.exe xoMQsIcw.exe File opened for modification C:\Windows\SysWOW64\sheOpenUninstall.gif xoMQsIcw.exe File opened for modification C:\Windows\SysWOW64\sheSetConvertTo.gif xoMQsIcw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\UWocMoAU HEMMQQQA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2664 256 WerFault.exe 145 4584 3312 WerFault.exe 148 4568 3784 WerFault.exe 143 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 944 reg.exe 1228 reg.exe 1292 reg.exe 4072 reg.exe 4968 reg.exe 3560 reg.exe 1888 reg.exe 4288 reg.exe 3752 reg.exe 4692 reg.exe 1988 reg.exe 4512 reg.exe 4000 reg.exe 5048 reg.exe 1888 reg.exe 2340 reg.exe 3312 reg.exe 2364 reg.exe 2428 reg.exe 5040 reg.exe 2392 reg.exe 1920 reg.exe 4816 reg.exe 1440 reg.exe 2388 reg.exe 1636 reg.exe 2884 reg.exe 4000 reg.exe 1704 reg.exe 3988 reg.exe 3644 reg.exe 5052 reg.exe 4292 reg.exe 4616 reg.exe 1308 reg.exe 3444 reg.exe 4136 reg.exe 1380 reg.exe 4612 reg.exe 4000 reg.exe 1584 reg.exe 4380 reg.exe 1932 reg.exe 3792 reg.exe 5084 reg.exe 2396 reg.exe 1152 reg.exe 2392 reg.exe 3916 reg.exe 3024 reg.exe 1636 reg.exe 3548 reg.exe 1888 reg.exe 2396 reg.exe 3336 reg.exe 4120 reg.exe 3856 reg.exe 380 reg.exe 3852 reg.exe 2692 reg.exe 944 reg.exe 1820 reg.exe 5088 reg.exe 1124 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 824 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 824 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 824 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 824 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3860 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3860 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3860 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3860 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4784 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4784 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4784 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4784 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5032 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5032 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5032 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 5032 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 540 Conhost.exe 540 Conhost.exe 540 Conhost.exe 540 Conhost.exe 5064 Conhost.exe 5064 Conhost.exe 5064 Conhost.exe 5064 Conhost.exe 4916 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4916 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4916 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4916 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4968 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4968 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4968 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4968 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1764 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1764 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1764 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 1764 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4704 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4704 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4704 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4704 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3096 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3096 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3096 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3096 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 4568 cmd.exe 4568 cmd.exe 4568 cmd.exe 4568 cmd.exe 3980 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3980 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3980 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 3980 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3664 xoMQsIcw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe 3664 xoMQsIcw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3664 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 83 PID 1344 wrote to memory of 3664 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 83 PID 1344 wrote to memory of 3664 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 83 PID 1344 wrote to memory of 3740 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 84 PID 1344 wrote to memory of 3740 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 84 PID 1344 wrote to memory of 3740 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 84 PID 1344 wrote to memory of 4576 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 86 PID 1344 wrote to memory of 4576 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 86 PID 1344 wrote to memory of 4576 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 86 PID 1344 wrote to memory of 204 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 88 PID 1344 wrote to memory of 204 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 88 PID 1344 wrote to memory of 204 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 88 PID 1344 wrote to memory of 1920 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 93 PID 1344 wrote to memory of 1920 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 93 PID 1344 wrote to memory of 1920 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 93 PID 1344 wrote to memory of 2268 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 92 PID 1344 wrote to memory of 2268 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 92 PID 1344 wrote to memory of 2268 1344 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 92 PID 4576 wrote to memory of 5004 4576 cmd.exe 91 PID 4576 wrote to memory of 5004 4576 cmd.exe 91 PID 4576 wrote to memory of 5004 4576 cmd.exe 91 PID 5004 wrote to memory of 4140 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 95 PID 5004 wrote to memory of 4140 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 95 PID 5004 wrote to memory of 4140 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 95 PID 4140 wrote to memory of 752 4140 cmd.exe 97 PID 4140 wrote to memory of 752 4140 cmd.exe 97 PID 4140 wrote to memory of 752 4140 cmd.exe 97 PID 5004 wrote to memory of 4072 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 98 PID 5004 wrote to memory of 4072 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 98 PID 5004 wrote to memory of 4072 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 98 PID 5004 wrote to memory of 1380 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 99 PID 5004 wrote to memory of 1380 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 99 PID 5004 wrote to memory of 1380 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 99 PID 752 wrote to memory of 1068 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 107 PID 752 wrote to memory of 1068 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 107 PID 752 wrote to memory of 1068 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 107 PID 5004 wrote to memory of 2392 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 100 PID 5004 wrote to memory of 2392 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 100 PID 5004 wrote to memory of 2392 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 100 PID 752 wrote to memory of 3956 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 103 PID 752 wrote to memory of 3956 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 103 PID 752 wrote to memory of 3956 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 103 PID 752 wrote to memory of 2868 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 108 PID 752 wrote to memory of 2868 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 108 PID 752 wrote to memory of 2868 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 108 PID 5004 wrote to memory of 1732 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 102 PID 5004 wrote to memory of 1732 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 102 PID 5004 wrote to memory of 1732 5004 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 102 PID 752 wrote to memory of 3540 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 109 PID 752 wrote to memory of 3540 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 109 PID 752 wrote to memory of 3540 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 109 PID 752 wrote to memory of 3008 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 113 PID 752 wrote to memory of 3008 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 113 PID 752 wrote to memory of 3008 752 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 113 PID 1068 wrote to memory of 824 1068 cmd.exe 116 PID 1068 wrote to memory of 824 1068 cmd.exe 116 PID 1068 wrote to memory of 824 1068 cmd.exe 116 PID 3008 wrote to memory of 2548 3008 cmd.exe 117 PID 3008 wrote to memory of 2548 3008 cmd.exe 117 PID 3008 wrote to memory of 2548 3008 cmd.exe 117 PID 1732 wrote to memory of 1520 1732 cmd.exe 118 PID 1732 wrote to memory of 1520 1732 cmd.exe 118 PID 1732 wrote to memory of 1520 1732 cmd.exe 118 PID 824 wrote to memory of 540 824 48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe 119 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe"C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\UWocMoAU\xoMQsIcw.exe"C:\Users\Admin\UWocMoAU\xoMQsIcw.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3664
-
-
C:\ProgramData\oaEgoEIs\jwosUEsM.exe"C:\ProgramData\oaEgoEIs\jwosUEsM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"2⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f823⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"4⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f825⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:3956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"6⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f827⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"8⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f829⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"10⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8211⤵
- Adds Run key to start application
PID:2408 -
C:\Users\Admin\bGQIYkgg\KMsYMMsk.exe"C:\Users\Admin\bGQIYkgg\KMsYMMsk.exe"12⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 28813⤵
- Program crash
PID:4568
-
-
-
C:\ProgramData\kCwEsIQk\dAQMMwcU.exe"C:\ProgramData\kCwEsIQk\dAQMMwcU.exe"12⤵PID:256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 256 -s 25613⤵
- Program crash
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"12⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8213⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"14⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8215⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"16⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8217⤵PID:540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"18⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8219⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"20⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8221⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"22⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8223⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"24⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8225⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"26⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8227⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"28⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8229⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"30⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8231⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"32⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8233⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"34⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8235⤵PID:4816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"36⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8237⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"38⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8239⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"40⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8241⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"42⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8243⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"44⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8245⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"46⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8247⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"48⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8249⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"50⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8251⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"52⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8253⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"54⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8255⤵PID:4768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"56⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8257⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"58⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8259⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"60⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8261⤵PID:4292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"62⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8263⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"64⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8265⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"66⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8267⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"68⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8269⤵PID:1476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"70⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8271⤵PID:844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"72⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8273⤵PID:532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"74⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8275⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"76⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8277⤵PID:3376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"78⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8279⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"80⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8281⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"82⤵PID:176
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8283⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"84⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8285⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"86⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8287⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"88⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8289⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"90⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8291⤵PID:356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"92⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8293⤵PID:4368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"94⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8295⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"96⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8297⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"98⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f8299⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"100⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82101⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"102⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82103⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"104⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82105⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"106⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exeC:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82107⤵PID:532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82"108⤵PID:4788
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
- UAC bypass
PID:4512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xeMAIAUA.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""108⤵PID:368
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵PID:3476
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
- Modifies registry key
PID:4692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
- Modifies visibility of file extensions in Explorer
PID:3444
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
- Modifies visibility of file extensions in Explorer
PID:4752
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵PID:1168
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
- UAC bypass
PID:4228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jcsgggwQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""106⤵PID:4224
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵PID:3012
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
- UAC bypass
PID:756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
- Modifies registry key
PID:1888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:5088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NaogUkAs.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""104⤵PID:356
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵PID:628
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies visibility of file extensions in Explorer
PID:2008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WuwUUcwg.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""102⤵PID:2408
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵PID:4332
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
- UAC bypass
PID:3540
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵PID:3848
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AEogMgoE.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""100⤵PID:3476
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵PID:3780
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
PID:2692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵
- Modifies registry key
PID:4616
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
- Modifies visibility of file extensions in Explorer
PID:3444
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3752
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
- Modifies registry key
PID:1636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YaoYQkkE.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""98⤵PID:2944
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵PID:3244
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
PID:1732
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- UAC bypass
- Modifies registry key
PID:2388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WsUIUYkQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""96⤵PID:4528
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵PID:1488
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵PID:2860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
- Modifies visibility of file extensions in Explorer
PID:444
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lQAoQAsA.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""94⤵PID:3560
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵PID:4888
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
- UAC bypass
- Modifies registry key
PID:1292
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵PID:3140
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3852
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies visibility of file extensions in Explorer
PID:1920
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵PID:2392
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
- UAC bypass
PID:3132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HKcYskcc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""92⤵PID:4728
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵PID:2884
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
PID:2432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hQYIgEMA.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""90⤵PID:1948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵PID:2988
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵PID:3036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies visibility of file extensions in Explorer
PID:3324
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- UAC bypass
- Modifies registry key
PID:3548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pCogcQkA.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""88⤵PID:4968
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵PID:3540
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
- Modifies registry key
PID:1704
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
PID:4784
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HIcMUcIc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""86⤵PID:3884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵PID:4788
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
PID:3680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵PID:3696
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies visibility of file extensions in Explorer
PID:900
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- UAC bypass
PID:3860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵PID:4412
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
PID:1220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VaUEwgcU.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""84⤵PID:8
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵PID:3916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sMEUMUUc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""82⤵PID:540
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵PID:3380
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- UAC bypass
- Modifies registry key
PID:4292
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵PID:3988
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
PID:3964
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- UAC bypass
PID:1416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CQYcUMkk.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""80⤵PID:3580
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:3104
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
- Modifies registry key
PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
PID:3820
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
- Modifies visibility of file extensions in Explorer
PID:1756
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
PID:4208
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵PID:3140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YawYQcIs.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""78⤵PID:4328
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵PID:4344
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aIoMoEEI.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""76⤵PID:3788
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵PID:3644
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
- Modifies registry key
PID:4000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
- Modifies registry key
PID:1636
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
PID:2644
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
PID:1820
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- UAC bypass
- Modifies registry key
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rIUoQcAQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""74⤵PID:444
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵PID:4888
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xWQYUEMQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""72⤵PID:372
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:2184
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
- Modifies registry key
PID:1932
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- Modifies registry key
PID:2884
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UCAwIEAk.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""70⤵PID:4224
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵PID:1440
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- UAC bypass
PID:3336
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:1360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qqwcwowk.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""68⤵PID:1884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵PID:4000
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
- Modifies registry key
PID:2364
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
- Modifies registry key
PID:3988
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
PID:4620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LAQcgEMI.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""66⤵PID:4368
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵PID:2776
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- UAC bypass
- Modifies registry key
PID:944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵PID:1168
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rGYIcIos.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""64⤵PID:1544
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:3144
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- UAC bypass
- Modifies registry key
PID:4136
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies registry key
PID:1440
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4120
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ggUIIkAE.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""62⤵PID:1420
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:4560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
- Modifies registry key
PID:3444
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:3964
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies visibility of file extensions in Explorer
PID:2868
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
- Modifies registry key
PID:5084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uEskAAwQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""60⤵PID:3012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:2988
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
- Modifies registry key
PID:4288
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\COsoUwEg.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""58⤵PID:4140
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:3816
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- UAC bypass
- Modifies registry key
PID:2692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵PID:3256
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:5048
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
PID:1888
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
PID:1428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RoUAkUgw.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""56⤵PID:2016
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵PID:1308
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- UAC bypass
PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NGskowQM.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""54⤵PID:4048
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:4204
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵PID:4528
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3312
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies visibility of file extensions in Explorer
PID:3488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xMQMAEwE.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""52⤵PID:2172
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:1488
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
PID:4516
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- Modifies registry key
PID:3336
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oeQsoQIU.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""50⤵PID:4976
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:3792
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
PID:796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
PID:4816
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2396
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\coossgso.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""48⤵PID:3012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:1976
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- UAC bypass
- Modifies registry key
PID:5040
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
PID:4000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
- Modifies visibility of file extensions in Explorer
PID:3668
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MAUMYYUc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""46⤵PID:4220
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:3312
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
- UAC bypass
PID:4620
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:1920
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
PID:4888
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- UAC bypass
- Modifies registry key
PID:3792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SokkwAIU.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""44⤵PID:3204
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:1884
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:5028
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
PID:4232
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
PID:112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZcsEgMMw.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""42⤵PID:1280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:4508
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:4188
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
- Modifies registry key
PID:3024
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:456 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵
- UAC bypass
PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KkwAEEAw.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""40⤵PID:4676
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:540
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
PID:2776
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵PID:4672
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2340
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
- Modifies registry key
PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GqkgYYIQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""38⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:4124
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- UAC bypass
PID:4516
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
PID:3696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CeUYAEMc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""36⤵PID:3816
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:4232
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
PID:824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
PID:1888
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
- Modifies registry key
PID:380
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
PID:4704
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:4344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DMAoEokM.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""34⤵PID:2548
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:460
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4380
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- UAC bypass
PID:3756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hWYswEwo.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""32⤵PID:2348
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:4188
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:376
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
- Modifies registry key
PID:3856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lUoYUooc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""30⤵PID:2364
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:5028
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
- Modifies registry key
PID:1228
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:2928
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:372
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:3376
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
PID:5080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TIUEsQsI.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""28⤵PID:2264
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:3996
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
PID:3744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QgMAIkok.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""26⤵PID:4768
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:3848
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
- Modifies registry key
PID:944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:208
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KIokkYYM.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""24⤵PID:1152
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:1068
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:3668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
PID:8
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
PID:3560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KmEAYoYI.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""22⤵PID:4012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4508
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:1160
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
PID:2388
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
PID:3336
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:1420
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- UAC bypass
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HMwgAAIM.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""20⤵PID:3644
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:952
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
PID:5072
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:1308
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- Modifies registry key
PID:1124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wWAgwkAQ.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""18⤵PID:2984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:4124
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4512
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:4508
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TYEwMEAU.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""16⤵PID:2380
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:4528
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4612
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XUgwkQEA.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""14⤵PID:3012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:2568
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
- Modifies registry key
PID:1988
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
PID:2428
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:2820
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:3388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eQEAIQoM.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""12⤵PID:1520
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:1476
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:2088
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:4968
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:1584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VAAQMAoI.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""10⤵PID:2984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:4600
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:4440
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:1176
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:3340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VqsgIwsc.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""8⤵PID:956
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4504
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:3540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uscMcIME.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2548
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4072
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1380
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yiUMYUUo.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1520
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:204
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2268
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dMococAw.bat" "C:\Users\Admin\AppData\Local\Temp\48990a87c7c1d6ed6ca0001f7ff95fe68b3dfec822532a44e7e56c1fd9b39f82.exe""2⤵PID:1156
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1908
-
-
-
C:\ProgramData\MUYcgEcI\HEMMQQQA.exeC:\ProgramData\MUYcgEcI\HEMMQQQA.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 256 -ip 2561⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3784 -ip 37841⤵PID:1152
-
C:\ProgramData\DgAwksMc\ZWUoIoos.exeC:\ProgramData\DgAwksMc\ZWUoIoos.exe1⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 2682⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3312 -ip 33121⤵PID:3144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD5ee6818597e0e936d2f921bb668819fae
SHA1dc479267a84311fe49c38c170b9893ad563d7a5c
SHA2563891a1eab91350198570e3d06cbfd48ba74f1a792d1d534eb47e4046499e6ff9
SHA5122034d42f6020062bcf81bbae257473bd155ab36797aa6002fec8e1fdce8e3f6a467a45297bf2304794dfbd4a22baa8e32e98ab37d487feb56397c4c56e6af302
-
Filesize
432KB
MD5ee6818597e0e936d2f921bb668819fae
SHA1dc479267a84311fe49c38c170b9893ad563d7a5c
SHA2563891a1eab91350198570e3d06cbfd48ba74f1a792d1d534eb47e4046499e6ff9
SHA5122034d42f6020062bcf81bbae257473bd155ab36797aa6002fec8e1fdce8e3f6a467a45297bf2304794dfbd4a22baa8e32e98ab37d487feb56397c4c56e6af302
-
Filesize
432KB
MD5a83d0ebf1671db3a2e1b8e7dfcf8f723
SHA139305c421f3d97e1dea8490b7527cadf68423aa4
SHA256395af102d7300103d0e5cf01a1d219de05b642e0d679ce9e46c6a92ba44b1798
SHA5127a021d18f18d37bed4eeb774a69ab82eff262811909f36cacf30a289be4e963f44f668d17b089acb9be707b78a2eb7af2e7f988e275ff665c86c3f0efc91b66c
-
Filesize
432KB
MD5a83d0ebf1671db3a2e1b8e7dfcf8f723
SHA139305c421f3d97e1dea8490b7527cadf68423aa4
SHA256395af102d7300103d0e5cf01a1d219de05b642e0d679ce9e46c6a92ba44b1798
SHA5127a021d18f18d37bed4eeb774a69ab82eff262811909f36cacf30a289be4e963f44f668d17b089acb9be707b78a2eb7af2e7f988e275ff665c86c3f0efc91b66c
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
436KB
MD58e416f490216d79ff33de411d186df15
SHA1f6c5927f18fe308ec23d0d3bf16925fbda34359d
SHA2565f8798c41e39eeecc379fa2695c30c6c34c7f7b55bb0a486119dfa1e358f20e0
SHA512dead59120c262ca8bbd82ffa7f3debd7b13ae966502c77db72fb335a59c9997716b094ce34cb6cc640eea57d03c314055a10e85a41c926d88ce01f16318c8bc7
-
Filesize
436KB
MD58e416f490216d79ff33de411d186df15
SHA1f6c5927f18fe308ec23d0d3bf16925fbda34359d
SHA2565f8798c41e39eeecc379fa2695c30c6c34c7f7b55bb0a486119dfa1e358f20e0
SHA512dead59120c262ca8bbd82ffa7f3debd7b13ae966502c77db72fb335a59c9997716b094ce34cb6cc640eea57d03c314055a10e85a41c926d88ce01f16318c8bc7