Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
181s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
Resource
win10v2004-20220812-en
General
-
Target
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
-
Size
524KB
-
MD5
82d53ea60db2054be732976b27171110
-
SHA1
7b16dab41a0513d39638928131306eb0720c40e6
-
SHA256
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee
-
SHA512
cd689a4d26103487bafbfcf20871e14988b8effd3158dbf6847aa0a7d9a9289d84dc3933c08042be0580d6101b16c65f7406f6b0a4a6de08109af47181fb9987
-
SSDEEP
12288:oDc/RxkurT41MhWI40TGHGO60NQzYtugp0pfUbWK0C3TC3zk:b4Gi6GHXNQzYtugn/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe,C:\\ProgramData\\KyQgIIwY\\aeAsoYwE.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe,C:\\ProgramData\\KyQgIIwY\\aeAsoYwE.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 54 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1052 dkYoQcIs.exe 1284 eqwogcUI.exe 1240 aEkEYQcQ.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\RemoveTrace.png.exe eqwogcUI.exe File created C:\Users\Admin\Pictures\UnpublishAssert.png.exe eqwogcUI.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation eqwogcUI.exe -
Loads dropped DLL 22 IoCs
pid Process 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eqwogcUI.exe = "C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe" eqwogcUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eqwogcUI.exe = "C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe" aEkEYQcQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yYcQgMAg.exe = "C:\\Users\\Admin\\OIUkwYUQ\\yYcQgMAg.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aeAsoYwE.exe = "C:\\ProgramData\\KyQgIIwY\\aeAsoYwE.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dkYoQcIs.exe = "C:\\Users\\Admin\\IUQcwkUM\\dkYoQcIs.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eqwogcUI.exe = "C:\\ProgramData\\PMEgMMEM\\eqwogcUI.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dkYoQcIs.exe = "C:\\Users\\Admin\\IUQcwkUM\\dkYoQcIs.exe" dkYoQcIs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\IUQcwkUM aEkEYQcQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\IUQcwkUM\dkYoQcIs aEkEYQcQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1664 1444 WerFault.exe 619 112 1828 WerFault.exe 621 1496 1028 WerFault.exe 623 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1544 reg.exe 1100 reg.exe 1852 reg.exe 1748 reg.exe 1604 reg.exe 1104 reg.exe 1884 reg.exe 1140 reg.exe 1564 reg.exe 568 reg.exe 2044 reg.exe 112 reg.exe 2008 reg.exe 1540 reg.exe 1952 reg.exe 1804 reg.exe 440 reg.exe 1256 reg.exe 1016 reg.exe 1468 reg.exe 1528 reg.exe 828 reg.exe 1320 reg.exe 1660 reg.exe 1804 reg.exe 992 reg.exe 1812 reg.exe 1112 reg.exe 1588 reg.exe 1016 reg.exe 1884 reg.exe 1320 reg.exe 952 reg.exe 520 reg.exe 820 reg.exe 1608 reg.exe 1784 reg.exe 1020 reg.exe 860 reg.exe 1840 reg.exe 1320 reg.exe 1844 reg.exe 520 reg.exe 1476 reg.exe 1172 reg.exe 828 reg.exe 1804 reg.exe 1948 reg.exe 792 reg.exe 1572 reg.exe 1728 reg.exe 1324 reg.exe 752 reg.exe 760 reg.exe 1940 reg.exe 1408 reg.exe 1732 reg.exe 828 reg.exe 1968 reg.exe 1860 reg.exe 1744 reg.exe 108 reg.exe 1828 reg.exe 1212 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1588 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1588 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1940 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1940 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1852 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1852 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1056 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1056 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 844 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 844 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 992 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 992 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1112 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1112 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2024 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2024 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2000 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2000 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1520 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1520 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 940 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 940 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1688 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1688 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1884 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1884 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 992 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 992 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1644 conhost.exe 1644 conhost.exe 112 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 112 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1524 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1524 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1112 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1112 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1884 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1884 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1588 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1588 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1524 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1524 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1256 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1256 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1936 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1936 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 440 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 440 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1436 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1436 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1540 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1540 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1012 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1012 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1364 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1364 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1724 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1724 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe 1284 eqwogcUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1052 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 27 PID 1348 wrote to memory of 1052 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 27 PID 1348 wrote to memory of 1052 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 27 PID 1348 wrote to memory of 1052 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 27 PID 1348 wrote to memory of 1284 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 28 PID 1348 wrote to memory of 1284 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 28 PID 1348 wrote to memory of 1284 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 28 PID 1348 wrote to memory of 1284 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 28 PID 1348 wrote to memory of 520 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 30 PID 1348 wrote to memory of 520 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 30 PID 1348 wrote to memory of 520 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 30 PID 1348 wrote to memory of 520 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 30 PID 520 wrote to memory of 1964 520 cmd.exe 32 PID 520 wrote to memory of 1964 520 cmd.exe 32 PID 520 wrote to memory of 1964 520 cmd.exe 32 PID 520 wrote to memory of 1964 520 cmd.exe 32 PID 1348 wrote to memory of 1336 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 33 PID 1348 wrote to memory of 1336 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 33 PID 1348 wrote to memory of 1336 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 33 PID 1348 wrote to memory of 1336 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 33 PID 1348 wrote to memory of 1112 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 34 PID 1348 wrote to memory of 1112 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 34 PID 1348 wrote to memory of 1112 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 34 PID 1348 wrote to memory of 1112 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 34 PID 1348 wrote to memory of 1260 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 37 PID 1348 wrote to memory of 1260 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 37 PID 1348 wrote to memory of 1260 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 37 PID 1348 wrote to memory of 1260 1348 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 37 PID 1964 wrote to memory of 1400 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 39 PID 1964 wrote to memory of 1400 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 39 PID 1964 wrote to memory of 1400 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 39 PID 1964 wrote to memory of 1400 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 39 PID 1400 wrote to memory of 832 1400 cmd.exe 41 PID 1400 wrote to memory of 832 1400 cmd.exe 41 PID 1400 wrote to memory of 832 1400 cmd.exe 41 PID 1400 wrote to memory of 832 1400 cmd.exe 41 PID 1964 wrote to memory of 1884 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 42 PID 1964 wrote to memory of 1884 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 42 PID 1964 wrote to memory of 1884 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 42 PID 1964 wrote to memory of 1884 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 42 PID 1964 wrote to memory of 108 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 46 PID 1964 wrote to memory of 108 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 46 PID 1964 wrote to memory of 108 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 46 PID 1964 wrote to memory of 108 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 46 PID 1964 wrote to memory of 2008 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 45 PID 1964 wrote to memory of 2008 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 45 PID 1964 wrote to memory of 2008 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 45 PID 1964 wrote to memory of 2008 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 45 PID 1964 wrote to memory of 112 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 48 PID 1964 wrote to memory of 112 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 48 PID 1964 wrote to memory of 112 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 48 PID 1964 wrote to memory of 112 1964 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 48 PID 112 wrote to memory of 1652 112 cmd.exe 50 PID 112 wrote to memory of 1652 112 cmd.exe 50 PID 112 wrote to memory of 1652 112 cmd.exe 50 PID 112 wrote to memory of 1652 112 cmd.exe 50 PID 832 wrote to memory of 1544 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 51 PID 832 wrote to memory of 1544 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 51 PID 832 wrote to memory of 1544 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 51 PID 832 wrote to memory of 1544 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 51 PID 832 wrote to memory of 1688 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 54 PID 832 wrote to memory of 1688 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 54 PID 832 wrote to memory of 1688 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 54 PID 832 wrote to memory of 1688 832 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 54 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe"C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\IUQcwkUM\dkYoQcIs.exe"C:\Users\Admin\IUQcwkUM\dkYoQcIs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1052
-
-
C:\ProgramData\PMEgMMEM\eqwogcUI.exe"C:\ProgramData\PMEgMMEM\eqwogcUI.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:1284
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"4⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"6⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"8⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"10⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"12⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"14⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee15⤵
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"16⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee17⤵
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"18⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"20⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"22⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"24⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"26⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee27⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"28⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"30⤵PID:1812
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
- Modifies registry key
PID:1324
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
- Modifies registry key
PID:1588
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵PID:1744
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HIQIMkkE.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""30⤵PID:1940
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GuwYwUwM.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""28⤵PID:1616
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:1232
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
PID:1436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
- Modifies registry key
PID:1968 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:1436
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:1960
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
PID:1104
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:1728
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gMIAcgIc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""26⤵PID:1336
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:760
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
- Modifies registry key
PID:1256
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
PID:1572
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
- Modifies registry key
PID:1608
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:1804 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UukQgwko.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""24⤵PID:1588
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:832
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
PID:108
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:1016
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZwwkogQk.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""22⤵PID:1436
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:1968
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
- Modifies registry key
PID:1660
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
PID:1232
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:1444
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- UAC bypass
PID:1304
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xMYQMIcs.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""20⤵PID:1224
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:876
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
PID:1016
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
PID:1752
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TOgQQcwM.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""18⤵PID:1160
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:1560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:820
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:952
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
- Modifies registry key
PID:440
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\osEYwAoo.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""16⤵PID:1884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:1604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee15⤵PID:1644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"16⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee17⤵
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"18⤵PID:1260
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- Modifies registry key
PID:1784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:1860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
PID:1840
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vsIsEMQs.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""18⤵PID:1944
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:1740
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LqEoMkEY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""16⤵PID:1804
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
- Modifies registry key
PID:1140
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:1604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:1844
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:1496
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DMwIEIIY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""14⤵PID:1940
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:1572
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:1104
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
PID:1172
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:828
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:1884
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sCoUokss.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""12⤵PID:436
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:900
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:1224
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:1172
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
PID:1944
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oisMcMEY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""10⤵PID:1952
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:1664
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:1160
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:1732
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LEYkUwwc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""8⤵PID:840
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:524
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:1688
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:1840
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:1224
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oqEswUcM.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""6⤵PID:628
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:1960
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1884
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2008
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:108
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dgYMIoYI.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1652
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1336
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1112
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FgcMUAMo.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""2⤵PID:1320
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1708
-
-
-
C:\ProgramData\VWcAssAk\aEkEYQcQ.exeC:\ProgramData\VWcAssAk\aEkEYQcQ.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1240
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee1⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵PID:1016
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VgIQEEwg.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""2⤵PID:1836
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1560
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee1⤵
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DKMQIAcM.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""2⤵PID:1160
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:440
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"3⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee4⤵
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"5⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"7⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee8⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"9⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee10⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"11⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"13⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee14⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"15⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee16⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"17⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee18⤵PID:1496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"19⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee20⤵PID:1752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"21⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee22⤵PID:1820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"23⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee24⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"25⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee26⤵PID:956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"27⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee28⤵PID:1056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"29⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee30⤵PID:1364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"31⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee32⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"33⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee34⤵PID:828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"35⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee36⤵PID:1772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"37⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee38⤵PID:1752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"39⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee40⤵PID:1412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"41⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee42⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"43⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee44⤵PID:1408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"45⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee46⤵PID:1016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"47⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee48⤵PID:1524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"49⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee50⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:1544 -
C:\Users\Admin\OIUkwYUQ\yYcQgMAg.exe"C:\Users\Admin\OIUkwYUQ\yYcQgMAg.exe"51⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 12052⤵
- Program crash
PID:1664
-
-
-
C:\ProgramData\KyQgIIwY\aeAsoYwE.exe"C:\ProgramData\KyQgIIwY\aeAsoYwE.exe"51⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 8852⤵
- Program crash
PID:112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"51⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee52⤵PID:1476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"53⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee54⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"55⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee56⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"57⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee58⤵PID:952
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 159⤵
- Modifies visibility of file extensions in Explorer
PID:1500
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 259⤵
- Modifies registry key
PID:1320
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f59⤵
- UAC bypass
- Modifies registry key
PID:1812
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kmwcQkgs.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""57⤵PID:1100
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs58⤵PID:752
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f57⤵
- UAC bypass
PID:832
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 257⤵PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 157⤵
- Modifies visibility of file extensions in Explorer
PID:860
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 155⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1408
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 255⤵PID:1500
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f55⤵
- UAC bypass
PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uyokoMkg.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""55⤵PID:556
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs56⤵PID:1952
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 153⤵
- Modifies visibility of file extensions in Explorer
PID:1564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 253⤵PID:956
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f53⤵
- UAC bypass
PID:568
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tgUkYQQg.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""53⤵PID:1224
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs54⤵PID:1740
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 151⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 251⤵
- Modifies registry key
PID:992
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f51⤵
- UAC bypass
- Modifies registry key
PID:1804
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AUUUUQAY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""51⤵PID:1436
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs52⤵PID:1164
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 149⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:860
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f49⤵
- UAC bypass
- Modifies registry key
PID:1852
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 249⤵PID:1952
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JikggUQc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""49⤵PID:1500
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs50⤵PID:1408
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 247⤵PID:524
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EUQsskII.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""47⤵PID:1324
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs48⤵PID:1748
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f47⤵
- UAC bypass
- Modifies registry key
PID:1804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 147⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:792
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 245⤵
- Modifies registry key
PID:112
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f45⤵
- UAC bypass
- Modifies registry key
PID:828
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\fqUUMUME.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""45⤵PID:1588
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs46⤵PID:1708
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 145⤵
- Modifies visibility of file extensions in Explorer
PID:1560
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 143⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 243⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\yckUQUcY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""43⤵PID:956
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs44⤵PID:1256
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f43⤵
- UAC bypass
- Modifies registry key
PID:952
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 141⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1320
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f41⤵
- UAC bypass
PID:1688
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 241⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nGggookY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""41⤵PID:1608
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs42⤵PID:1324
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 139⤵
- Modifies visibility of file extensions in Explorer
PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 239⤵PID:1940
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f39⤵
- UAC bypass
PID:1044
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DAYQQEow.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""39⤵PID:280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs40⤵PID:2008
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 137⤵
- Modifies visibility of file extensions in Explorer
PID:760
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 237⤵
- Modifies registry key
PID:520
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f37⤵
- UAC bypass
PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SEUkYYYc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""37⤵PID:956
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs38⤵PID:1632
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f35⤵
- UAC bypass
PID:1644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 235⤵PID:2040
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 135⤵
- Modifies visibility of file extensions in Explorer
PID:1836
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nWUAEwwo.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""35⤵PID:1140
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs36⤵PID:1348
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 133⤵
- Modifies visibility of file extensions in Explorer
PID:1436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 233⤵PID:1736
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uAcQMQgE.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""33⤵PID:1948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs34⤵PID:1104
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f33⤵
- UAC bypass
PID:1112
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 131⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1100
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 231⤵
- Modifies registry key
PID:1212
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f31⤵
- UAC bypass
PID:860
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LacoYcIE.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""31⤵PID:1408
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs32⤵PID:1012
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 129⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1476
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bqcUkkoQ.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""29⤵PID:1028
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs30⤵PID:1608
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f29⤵
- UAC bypass
- Modifies registry key
PID:568
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 229⤵
- Modifies registry key
PID:2044
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 127⤵
- Modifies visibility of file extensions in Explorer
PID:1220
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 227⤵
- Modifies registry key
PID:828
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f27⤵
- UAC bypass
PID:1736
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WuEcwUYc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""27⤵PID:2028
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs28⤵PID:1940
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 125⤵
- Modifies visibility of file extensions in Explorer
PID:1652
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 225⤵
- Modifies registry key
PID:1564
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f25⤵
- UAC bypass
PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\aOEokwQs.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""25⤵PID:1336
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs26⤵PID:1348
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 123⤵
- Modifies visibility of file extensions in Explorer
PID:1112
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 223⤵
- Modifies registry key
PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f23⤵
- UAC bypass
- Modifies registry key
PID:1828
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oIYMoEso.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""23⤵PID:1104
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs24⤵PID:1836
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 121⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1748
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 221⤵PID:860
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f21⤵
- UAC bypass
PID:1056
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bQUoQAoU.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""21⤵PID:1944
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs22⤵PID:840
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 119⤵
- Modifies visibility of file extensions in Explorer
PID:1976
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f19⤵
- UAC bypass
PID:1472
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 219⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dIkUkssw.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""19⤵PID:1140
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs20⤵PID:1724
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 217⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f17⤵
- UAC bypass
PID:1260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 117⤵
- Modifies visibility of file extensions in Explorer
PID:840
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YwIIscQI.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""17⤵PID:2028
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs18⤵PID:1828
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YisEEoMM.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""15⤵PID:1564
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f15⤵
- UAC bypass
PID:980
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 215⤵PID:1028
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 115⤵
- Modifies visibility of file extensions in Explorer
PID:2024
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 213⤵
- Modifies registry key
PID:520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 113⤵
- Modifies visibility of file extensions in Explorer
PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OAowcMck.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""13⤵PID:1256
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs14⤵PID:1752
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f13⤵
- UAC bypass
PID:1852
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 211⤵PID:1336
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f11⤵
- UAC bypass
PID:1820
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pwMwMkoQ.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""11⤵PID:1812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs12⤵PID:616
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 111⤵
- Modifies visibility of file extensions in Explorer
PID:1600
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1468
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EAgowAUg.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""9⤵PID:820
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs10⤵PID:992
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵
- UAC bypass
- Modifies registry key
PID:1528
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:568
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵
- Modifies visibility of file extensions in Explorer
PID:1844
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RyoAcIso.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""7⤵PID:1412
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:1444
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
PID:1828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:1748
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵
- Modifies registry key
PID:1572
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:1372
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YCIQkQos.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""5⤵PID:616
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1960
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:600
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:1044
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gOMAoEIE.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""3⤵PID:1140
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:1056
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:1844
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1732
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵PID:1616
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:752
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1744
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1160
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nsooQswY.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2040 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1056
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "13532449481177667538-1684130570-281896216-928983378474783520-481076002885193771"1⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵PID:1748
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1320
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:1016
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eycEgIsw.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""2⤵PID:1692
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1400
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-819046306621850499-12869884238147436381734068849-2124303451-1039542834593259959"1⤵PID:440
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1763197560106737450121750642720764158591823342521-17922812731132077090-2130136487"1⤵PID:760
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "808825425-20524037361202878423-2068430584198928572414372754431039292410711311749"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"4⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"6⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"8⤵PID:992
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\racgYQQc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""8⤵PID:1652
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:1664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- Modifies registry key
PID:1540
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:792
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NQsYUcIc.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""6⤵PID:1948
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:1944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:760
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wyMUcEkQ.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""4⤵PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:820
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1020
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:1016
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:1948 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KYEwoQsE.bat" "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe""2⤵PID:1420
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-8788640921587684355-758683463-149014934-842821521424852736-21439823191870348407"1⤵
- Modifies visibility of file extensions in Explorer
PID:1104
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "481840063-2087029114-966497322-709085484-96057530119185393552350876422073737936"1⤵PID:1860
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1468
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1046427241-2104218921-132009917310963304991511814014-1222290189-17307865312106277465"1⤵
- Modifies visibility of file extensions in Explorer
PID:1016
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1053437024-1183690284-1285422970-188575439012485592415229438291219882142472956932"1⤵
- Modifies visibility of file extensions in Explorer
PID:600
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1652
-
C:\ProgramData\hYgosQUI\wowUcwMM.exeC:\ProgramData\hYgosQUI\wowUcwMM.exe1⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 962⤵
- Program crash
PID:1496
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481KB
MD55c8bc478275cb1faf2e3ddc91ee9f6db
SHA1c7d0e7173cf1401e25fba2ea0fb9cbc0a8d600c2
SHA25689ee57b4ee5f4173e94fbb0fbbb0eba623f490580dd33edee47ff8c47442a4cd
SHA512f48797b4c9ac8596d4e45f573b3f1b96e53a69c3a6c9dd4dfadae2950210c5a41b846fab98348b663858bcf4198b6e9632b512209b9749b6b6ee0eabc4b45528
-
Filesize
479KB
MD51ba17b5deb96192c417b0d8c52b9bbe6
SHA143054552e9f06b42ffef2ceec729cb8ccf0f3511
SHA256c536e3925f0d089bebe1d5251e3521f58f4b25da59f07ec5ec26658b7ae45a54
SHA512fa63443d47bf371b3c49e5f984073c072153c99f859add33850331a3d560ab4db6c85eb17e58b91c4041c6482e3d061de8a032cb3a721a12407096560307d9eb
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
37KB
MD5895f1104e0efe385bd73f8b1a70244db
SHA1d3105502dd3006873af0de96eeab033076a85c74
SHA25699ba1fcfeb83c781b1dd3d1a22007de6ede3e862f8f01ce7077d5d0908c0385a
SHA512ab2c413556655e2c33fa03a77721535318faf851c41137621c2e892e9851e360abe88c41400e2595439d64859254b57ec1d4af3466b7bfd5bac63866b0b3960b
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
478KB
MD51002562e3aa3737a208979a4b3ed2a78
SHA134aa1cb1b895fd4a2ab1b37692e7737625fb42bc
SHA256739f99405c51bbb83bfe12b71e94d3b2102f887558ee90fa78307f931feb1824
SHA512b5cd28e8b78c0994e8ce5e8c954e30735bb6989fac013775021cb49213ccf73ed9d78fd78c2f6c1c9cb5bee666da9b68f729935fab42e9a7a3ec2450777caa4a
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
481KB
MD55c8bc478275cb1faf2e3ddc91ee9f6db
SHA1c7d0e7173cf1401e25fba2ea0fb9cbc0a8d600c2
SHA25689ee57b4ee5f4173e94fbb0fbbb0eba623f490580dd33edee47ff8c47442a4cd
SHA512f48797b4c9ac8596d4e45f573b3f1b96e53a69c3a6c9dd4dfadae2950210c5a41b846fab98348b663858bcf4198b6e9632b512209b9749b6b6ee0eabc4b45528
-
Filesize
481KB
MD55c8bc478275cb1faf2e3ddc91ee9f6db
SHA1c7d0e7173cf1401e25fba2ea0fb9cbc0a8d600c2
SHA25689ee57b4ee5f4173e94fbb0fbbb0eba623f490580dd33edee47ff8c47442a4cd
SHA512f48797b4c9ac8596d4e45f573b3f1b96e53a69c3a6c9dd4dfadae2950210c5a41b846fab98348b663858bcf4198b6e9632b512209b9749b6b6ee0eabc4b45528
-
Filesize
478KB
MD51002562e3aa3737a208979a4b3ed2a78
SHA134aa1cb1b895fd4a2ab1b37692e7737625fb42bc
SHA256739f99405c51bbb83bfe12b71e94d3b2102f887558ee90fa78307f931feb1824
SHA512b5cd28e8b78c0994e8ce5e8c954e30735bb6989fac013775021cb49213ccf73ed9d78fd78c2f6c1c9cb5bee666da9b68f729935fab42e9a7a3ec2450777caa4a
-
Filesize
478KB
MD51002562e3aa3737a208979a4b3ed2a78
SHA134aa1cb1b895fd4a2ab1b37692e7737625fb42bc
SHA256739f99405c51bbb83bfe12b71e94d3b2102f887558ee90fa78307f931feb1824
SHA512b5cd28e8b78c0994e8ce5e8c954e30735bb6989fac013775021cb49213ccf73ed9d78fd78c2f6c1c9cb5bee666da9b68f729935fab42e9a7a3ec2450777caa4a