Analysis
-
max time kernel
151s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe
Resource
win10v2004-20220901-en
General
-
Target
6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe
-
Size
469KB
-
MD5
695e2e0f57248d7ffff4eb57a47a9f70
-
SHA1
b33306a944f96113b63a6f737b1e58fa4b059d38
-
SHA256
6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc
-
SHA512
25596bc420fdd8490178ea2eee96e02a0d29b6ad2bb0a23263ef3b8f8ed936deb7a54686e3e40559c586ce7b8a14694d011e6b8a9354850152fca12e61c2b601
-
SSDEEP
12288:tmoW3zuCkypEg3XvoOr+4EzgAzOiq0MGrAHOBHsrE/vnrm9wyXW18vT:MoW36knXvD+ZzgWOirsHQ/y9SOT
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 58 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 212 gCosWAwp.exe 1456 nEoYUwAE.exe 1704 ZQQYEcAE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation gCosWAwp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nEoYUwAE.exe = "C:\\ProgramData\\AOsEwsYA\\nEoYUwAE.exe" ZQQYEcAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gCosWAwp.exe = "C:\\Users\\Admin\\uSgQoQMY\\gCosWAwp.exe" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nEoYUwAE.exe = "C:\\ProgramData\\AOsEwsYA\\nEoYUwAE.exe" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gCosWAwp.exe = "C:\\Users\\Admin\\uSgQoQMY\\gCosWAwp.exe" gCosWAwp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nEoYUwAE.exe = "C:\\ProgramData\\AOsEwsYA\\nEoYUwAE.exe" nEoYUwAE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheReceiveConnect.xlsb gCosWAwp.exe File opened for modification C:\Windows\SysWOW64\sheTraceSync.rar gCosWAwp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\uSgQoQMY ZQQYEcAE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\uSgQoQMY\gCosWAwp ZQQYEcAE.exe File created C:\Windows\SysWOW64\shell32.dll.exe gCosWAwp.exe File opened for modification C:\Windows\SysWOW64\sheMountAdd.gif gCosWAwp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2212 reg.exe 2604 reg.exe 4032 reg.exe 2168 reg.exe 4872 reg.exe 1852 reg.exe 2852 reg.exe 4088 reg.exe 5092 reg.exe 3916 reg.exe 4448 reg.exe 3128 reg.exe 2012 reg.exe 4032 reg.exe 2444 reg.exe 2016 reg.exe 3740 reg.exe 2852 reg.exe 2864 reg.exe 1564 reg.exe 684 reg.exe 1728 reg.exe 3172 reg.exe 2352 reg.exe 2956 reg.exe 2772 reg.exe 2300 reg.exe 3916 reg.exe 1844 reg.exe 3796 reg.exe 1212 reg.exe 3868 reg.exe 720 reg.exe 4992 reg.exe 1164 reg.exe 1512 reg.exe 2128 reg.exe 2780 reg.exe 2660 reg.exe 2296 reg.exe 3848 reg.exe 2168 reg.exe 2128 reg.exe 1712 reg.exe 4652 reg.exe 3160 reg.exe 2364 reg.exe 1868 reg.exe 796 reg.exe 2352 reg.exe 3392 reg.exe 3780 reg.exe 4884 reg.exe 1492 reg.exe 2608 reg.exe 1020 reg.exe 4848 reg.exe 4184 reg.exe 3708 reg.exe 2808 reg.exe 2600 reg.exe 4780 reg.exe 1516 reg.exe 5020 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 2808 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 2808 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 2808 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 2808 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4324 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4324 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4324 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4324 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3516 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3516 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3516 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3516 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1992 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1992 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1992 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1992 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4932 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4932 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4932 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4932 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4280 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4280 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4280 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 4280 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1520 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1520 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1520 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1520 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3400 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3400 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3400 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3400 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 432 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 432 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 432 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 432 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3064 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3064 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3064 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 3064 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 972 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 972 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 972 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 972 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 736 cmd.exe 736 cmd.exe 736 cmd.exe 736 cmd.exe 1752 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1752 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1752 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 1752 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 212 gCosWAwp.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe 212 gCosWAwp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 796 wrote to memory of 212 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 84 PID 796 wrote to memory of 212 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 84 PID 796 wrote to memory of 212 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 84 PID 796 wrote to memory of 1456 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 85 PID 796 wrote to memory of 1456 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 85 PID 796 wrote to memory of 1456 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 85 PID 796 wrote to memory of 3688 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 87 PID 796 wrote to memory of 3688 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 87 PID 796 wrote to memory of 3688 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 87 PID 796 wrote to memory of 4468 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 89 PID 796 wrote to memory of 4468 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 89 PID 796 wrote to memory of 4468 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 89 PID 796 wrote to memory of 3740 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 92 PID 796 wrote to memory of 3740 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 92 PID 796 wrote to memory of 3740 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 92 PID 3688 wrote to memory of 3788 3688 cmd.exe 91 PID 3688 wrote to memory of 3788 3688 cmd.exe 91 PID 3688 wrote to memory of 3788 3688 cmd.exe 91 PID 796 wrote to memory of 3948 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 94 PID 796 wrote to memory of 3948 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 94 PID 796 wrote to memory of 3948 796 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 94 PID 3788 wrote to memory of 4884 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 96 PID 3788 wrote to memory of 4884 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 96 PID 3788 wrote to memory of 4884 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 96 PID 4884 wrote to memory of 1848 4884 cmd.exe 98 PID 4884 wrote to memory of 1848 4884 cmd.exe 98 PID 4884 wrote to memory of 1848 4884 cmd.exe 98 PID 3788 wrote to memory of 2300 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 99 PID 3788 wrote to memory of 2300 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 99 PID 3788 wrote to memory of 2300 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 99 PID 3788 wrote to memory of 4992 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 105 PID 3788 wrote to memory of 4992 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 105 PID 3788 wrote to memory of 4992 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 105 PID 3788 wrote to memory of 3492 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 100 PID 3788 wrote to memory of 3492 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 100 PID 3788 wrote to memory of 3492 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 100 PID 3788 wrote to memory of 1032 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 101 PID 3788 wrote to memory of 1032 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 101 PID 3788 wrote to memory of 1032 3788 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 101 PID 1848 wrote to memory of 3140 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 107 PID 1848 wrote to memory of 3140 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 107 PID 1848 wrote to memory of 3140 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 107 PID 1848 wrote to memory of 3712 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 109 PID 1848 wrote to memory of 3712 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 109 PID 1848 wrote to memory of 3712 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 109 PID 1848 wrote to memory of 1728 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 110 PID 1848 wrote to memory of 1728 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 110 PID 1848 wrote to memory of 1728 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 110 PID 1848 wrote to memory of 2960 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 112 PID 1848 wrote to memory of 2960 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 112 PID 1848 wrote to memory of 2960 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 112 PID 1848 wrote to memory of 2648 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 113 PID 1848 wrote to memory of 2648 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 113 PID 1848 wrote to memory of 2648 1848 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 113 PID 3140 wrote to memory of 2808 3140 cmd.exe 117 PID 3140 wrote to memory of 2808 3140 cmd.exe 117 PID 3140 wrote to memory of 2808 3140 cmd.exe 117 PID 1032 wrote to memory of 4272 1032 cmd.exe 118 PID 1032 wrote to memory of 4272 1032 cmd.exe 118 PID 1032 wrote to memory of 4272 1032 cmd.exe 118 PID 2648 wrote to memory of 4848 2648 cmd.exe 119 PID 2648 wrote to memory of 4848 2648 cmd.exe 119 PID 2648 wrote to memory of 4848 2648 cmd.exe 119 PID 2808 wrote to memory of 2016 2808 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe 120 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe"C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\uSgQoQMY\gCosWAwp.exe"C:\Users\Admin\uSgQoQMY\gCosWAwp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:212
-
-
C:\ProgramData\AOsEwsYA\nEoYUwAE.exe"C:\ProgramData\AOsEwsYA\nEoYUwAE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"2⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"4⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"6⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"8⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"10⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"12⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"14⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"16⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"18⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"20⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"22⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc23⤵
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"24⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"26⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc27⤵
- Suspicious behavior: EnumeratesProcesses
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"28⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc29⤵PID:736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"30⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"32⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc33⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"34⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc35⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"36⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc37⤵PID:2996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"38⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc39⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"40⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc41⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"42⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc43⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"44⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc45⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"46⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc47⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"48⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc49⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"50⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc51⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"52⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc53⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"54⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc55⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"56⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc57⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"58⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc59⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"60⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc61⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"62⤵
- Modifies visibility of file extensions in Explorer
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc63⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"64⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc65⤵PID:3664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"66⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc67⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"68⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc69⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"70⤵
- Modifies visibility of file extensions in Explorer
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc71⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"72⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc73⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"74⤵PID:1848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc75⤵
- Modifies visibility of file extensions in Explorer
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"76⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc77⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"78⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc79⤵PID:3700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"80⤵PID:3456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc81⤵PID:1412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"82⤵PID:3520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
- UAC bypass
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc83⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"84⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc85⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"86⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc87⤵
- Modifies visibility of file extensions in Explorer
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"88⤵PID:3944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc89⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"90⤵PID:3756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵
- Modifies visibility of file extensions in Explorer
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc91⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"92⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc93⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"94⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc95⤵PID:876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"96⤵PID:4836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc97⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"98⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc99⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"100⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc101⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"102⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc103⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"104⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc105⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"106⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc107⤵PID:916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"108⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc109⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"110⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc111⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"112⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc113⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"114⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc115⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc"116⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exeC:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc117⤵PID:3988
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f118⤵
- UAC bypass
PID:3436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2118⤵PID:2648
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:916
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1118⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4872
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OWEEEUUg.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""116⤵PID:4320
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs117⤵PID:760
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
- UAC bypass
- Modifies registry key
PID:2600
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵PID:1804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
- Modifies visibility of file extensions in Explorer
PID:2136
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
- UAC bypass
- Modifies registry key
PID:796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵PID:4720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
- Modifies visibility of file extensions in Explorer
PID:4036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mmAkooQU.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""114⤵PID:4664
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵PID:4636
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
- UAC bypass
PID:3480
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵
- Modifies registry key
PID:2772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
- Modifies visibility of file extensions in Explorer
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dQUUUQAk.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""112⤵PID:2332
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵PID:2520
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
- UAC bypass
- Modifies registry key
PID:2168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DgQEgwQU.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""110⤵PID:1032
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵PID:4484
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵PID:1328
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
- Modifies visibility of file extensions in Explorer
PID:2912
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
- Modifies visibility of file extensions in Explorer
PID:4272
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
- UAC bypass
PID:3716 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:1664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
- Modifies registry key
PID:4448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jEwckYgI.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""108⤵PID:2352
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵PID:4932
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵PID:3804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1564
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
- UAC bypass
PID:3260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dSIAoEEM.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""106⤵PID:4048
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵PID:4764
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qswoEsYw.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""104⤵PID:4056
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵PID:5084
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
- UAC bypass
PID:3132 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:3476
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
- Modifies registry key
PID:3848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2864
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\moosMkwc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""102⤵PID:3732
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵PID:412
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
- UAC bypass
PID:4652
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵PID:4076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies visibility of file extensions in Explorer
PID:4800
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wQEYQEsc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""100⤵PID:3532
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵PID:2808
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
PID:2744
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵PID:5024
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4032
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:2644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
- Modifies registry key
PID:2956
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
PID:4276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rccYocws.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""98⤵PID:4864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:2172
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵PID:2036
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TWYEUcgY.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""96⤵PID:2968
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵PID:1856
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- UAC bypass
PID:4952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
- Modifies visibility of file extensions in Explorer
PID:4628
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
- UAC bypass
PID:972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BucEQQgs.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""94⤵PID:852
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3888
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies visibility of file extensions in Explorer
PID:3720
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵PID:1244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tMUQsEQA.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""92⤵PID:4660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2716
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵PID:2136
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
- UAC bypass
PID:2668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2604
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EiYQIYwE.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""90⤵PID:960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:2520
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵PID:3224
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
PID:4304
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
- Modifies registry key
PID:2808
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3916
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Amowowsg.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""88⤵PID:3908
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵PID:3532
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- UAC bypass
- Modifies registry key
PID:1712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵PID:3892
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:720
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies visibility of file extensions in Explorer
PID:4188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MCgYEQAY.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""86⤵PID:2772
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵PID:2512
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
PID:4492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
- Modifies registry key
PID:5020
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KwoQUIQE.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""84⤵PID:1664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:3528
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵PID:4164
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵PID:3888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
PID:4176
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ooYkcoEo.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""82⤵PID:2128
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵PID:5084
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- UAC bypass
PID:4036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵PID:1444
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
PID:1388
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rKMQQkoc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""80⤵PID:4796
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:4228
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- UAC bypass
PID:1240
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
- Modifies registry key
PID:4780
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3708
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
- Modifies registry key
PID:2212
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zIMIgwcs.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""78⤵PID:2236
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵PID:1644
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
- Modifies registry key
PID:2852 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4572
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LGAgAIAs.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""76⤵PID:4432
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵PID:3468
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵PID:4300
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
- Modifies registry key
PID:2016 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:2548
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
PID:2368
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zqwQcAYE.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""74⤵PID:2676
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
- Modifies visibility of file extensions in Explorer
PID:1352
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵PID:2644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
PID:2296 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:3524
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
PID:4696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jwksgcUc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""72⤵PID:3792
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:2968
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
- Modifies registry key
PID:1020
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- Modifies registry key
PID:4848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
PID:4636
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmAUkUQQ.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""70⤵PID:3752
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵PID:2716
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- UAC bypass
PID:1852
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵PID:2604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵PID:5108
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
- Modifies registry key
PID:5092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵
- UAC bypass
PID:2668 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV170⤵PID:3456
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cWsEMQEU.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""68⤵PID:2744
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵PID:3308
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵PID:692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:4032
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YIoQgsow.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""66⤵PID:2520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:4484
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵PID:2212
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- UAC bypass
PID:5024 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵
- UAC bypass
PID:2328
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2444
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- UAC bypass
- Modifies registry key
PID:2352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YgQEAQgQ.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""64⤵PID:3468
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:2016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies visibility of file extensions in Explorer
PID:4924
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵PID:2172
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
- Modifies registry key
PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tqYkgMsI.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""62⤵PID:3784
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:2676
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
PID:3732
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zaYgQwoM.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""60⤵PID:2984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
- Modifies visibility of file extensions in Explorer
PID:1520
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
PID:4816
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵PID:4492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵PID:540
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- UAC bypass
PID:736
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WSMYwokI.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""58⤵PID:380
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:1388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵
- Modifies visibility of file extensions in Explorer
PID:5108
-
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
PID:4720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies registry key
PID:4032 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IyIQEEYU.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""56⤵PID:1372
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵PID:684
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵PID:4196
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
PID:4664
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WSkskAQk.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""54⤵PID:4572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:1888
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:5068
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
- Modifies registry key
PID:3868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wiUsUoYg.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""52⤵PID:2568
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:1264
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- Modifies registry key
PID:2352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵PID:4924
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PqsgQskk.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""50⤵PID:1756
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:3528
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
- Modifies registry key
PID:1516
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
PID:2128
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵PID:4312
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵PID:1804
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hwIgcsok.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""48⤵PID:2956
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:4480
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- Modifies registry key
PID:4884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
PID:2364
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OMYgcQks.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""46⤵PID:1988
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:4456
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵PID:2668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
- Modifies registry key
PID:684
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
PID:3804
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WmAEAQok.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""44⤵PID:3752
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:2540
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- Modifies registry key
PID:2012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
- Modifies registry key
PID:3160
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:4664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NoEQMEsI.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""42⤵PID:916
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:4260
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:4688
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵PID:1352
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jSUMQQkM.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""40⤵
- Suspicious behavior: EnumeratesProcesses
PID:736 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:3516
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
- Modifies registry key
PID:2660
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:1212
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IyUAEsMU.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""38⤵PID:996
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3780
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵PID:4816
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:2548
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
PID:2544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cyYcEsEE.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""36⤵PID:2420
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:4000
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
PID:5040
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:3492
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
PID:2648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MSooYkkk.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""34⤵PID:1904
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:1664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
PID:2272
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
- Modifies registry key
PID:3796
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZaIAkMYI.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""32⤵PID:2392
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
- Modifies visibility of file extensions in Explorer
PID:4804
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- UAC bypass
- Modifies registry key
PID:4088
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:748
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
PID:412
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nIkIsMwM.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""30⤵PID:4608
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:4156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
PID:2332
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:4184
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1852
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- Modifies registry key
PID:3780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QeskAIwc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""28⤵PID:2552
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:2796
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:3496
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wCcowMUM.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""26⤵PID:928
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:5016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
PID:3524
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:2852
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1868
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IUEMQgMk.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""24⤵PID:4084
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:2904
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:2128
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵PID:4804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
PID:3128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vGsIQUIc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""22⤵PID:3784
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:5092
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:1288
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- UAC bypass
PID:1432
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:3988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HkwscUUg.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""20⤵PID:2272
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:1264
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3392
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:4808
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
PID:4800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pAYIEgkg.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""18⤵PID:4776
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:1164
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:4884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
PID:1020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tQwUgAkc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""16⤵PID:1972
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:1468
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1844
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
PID:2744
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:1512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\usEYscEk.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""14⤵PID:2036
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:2996
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:2956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:3916
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\coAcUYgY.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""12⤵PID:2608
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:848
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1164
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:4184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EyMwEUkA.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""10⤵PID:4584
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:5068
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:3392
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:2168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pWkEMUcE.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""8⤵PID:4120
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:3756
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:2240
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:3712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:2960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tWkgoMEs.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:4848
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2300
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:3492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FQUMYowc.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4272
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:4992
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4468
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3740
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:3948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EyYEoIcY.bat" "C:\Users\Admin\AppData\Local\Temp\6c52784fd8c27230485e19657d352e013f7d9e751b26a571c690576f845f45dc.exe""2⤵PID:3984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:2544
-
-
-
C:\ProgramData\nKwcIogI\ZQQYEcAE.exeC:\ProgramData\nKwcIogI\ZQQYEcAE.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4680
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv Q6NbiQpwZ0uFhD7tvZWNMg.0.21⤵PID:5036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4312
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4420
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
430KB
MD51bc3ff185b751358e7186d4773b02e02
SHA1e3b57c55280dde2fafa05829134f0b3ac269c5cc
SHA256851d49f6f43bddb89a8698b49ec04d39d05f182a6fb68b349e6e83e6a5e3ecee
SHA512edc96a3f0828cb39a7f9153a12fc7a3f162ad33327a7fd392ffe3a875f42e459ca7c06c5a4c5b8409cdf85b92201e70bd64c3a0ca7a3b9a469c14d0671702f06
-
Filesize
430KB
MD51bc3ff185b751358e7186d4773b02e02
SHA1e3b57c55280dde2fafa05829134f0b3ac269c5cc
SHA256851d49f6f43bddb89a8698b49ec04d39d05f182a6fb68b349e6e83e6a5e3ecee
SHA512edc96a3f0828cb39a7f9153a12fc7a3f162ad33327a7fd392ffe3a875f42e459ca7c06c5a4c5b8409cdf85b92201e70bd64c3a0ca7a3b9a469c14d0671702f06
-
Filesize
429KB
MD5c738fab601d855d1936cf8820a3b2b6e
SHA1909e5d5b3980cd92f7f340e7874ec72eb0c7458f
SHA256254288f993907cf97dc40f2c64d110800a8ea51075c85a115a29add534c0a840
SHA512ef1958cac9fe517bdd043f8ac5d882b42a59a30b618f5c0a9d10cd5b2930ac822f7b10d9ab4cd3ee64312f0ef5df827b4e6fa5ea9e22be0249bc79b971789996
-
Filesize
429KB
MD5c738fab601d855d1936cf8820a3b2b6e
SHA1909e5d5b3980cd92f7f340e7874ec72eb0c7458f
SHA256254288f993907cf97dc40f2c64d110800a8ea51075c85a115a29add534c0a840
SHA512ef1958cac9fe517bdd043f8ac5d882b42a59a30b618f5c0a9d10cd5b2930ac822f7b10d9ab4cd3ee64312f0ef5df827b4e6fa5ea9e22be0249bc79b971789996
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
27KB
MD56fb2a38dc107eacb41cf1656e899cf70
SHA14eee44b18576e84de7b163142b537d2fe6231845
SHA25662e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea
SHA512939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
430KB
MD591b5e0ff823bd9584b5d2bcc3d62ceb9
SHA16b58b7c702f7088e8ee9065e54ccb6bea8928fcc
SHA256ea4495342d0e8d0dc6c0fd432bc724e856b2f7303fca01b7ec979d051260d397
SHA5125081550682b70222e353ca78e66fb70f326e5f68c48adc221a305755aea8527497b9531e12807cc635186c71441c9a68e675d7632f1bcfab6c30c3480cc9e147
-
Filesize
430KB
MD591b5e0ff823bd9584b5d2bcc3d62ceb9
SHA16b58b7c702f7088e8ee9065e54ccb6bea8928fcc
SHA256ea4495342d0e8d0dc6c0fd432bc724e856b2f7303fca01b7ec979d051260d397
SHA5125081550682b70222e353ca78e66fb70f326e5f68c48adc221a305755aea8527497b9531e12807cc635186c71441c9a68e675d7632f1bcfab6c30c3480cc9e147