Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 02:13
Static task
static1
Behavioral task
behavioral1
Sample
35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe
Resource
win10v2004-20220901-en
General
-
Target
35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe
-
Size
487KB
-
MD5
83e312c1706ef3c4e6e2d851988f0e40
-
SHA1
a9b8b851f4d355fc398b756dc4ee013c13e0043f
-
SHA256
35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e
-
SHA512
9bbd2dfd711b711be581c3d99f8cc78fdbc170a93f4d4cd5fa150dca7c96bc80798987c0936ef0eb1c3b7cb06864cc1593b93215c5ac1cc8c66ceafd2164befd
-
SSDEEP
12288:fDy0fe57AMbFI5v3S7dofiACsS5p8y0dtWRvpp2Au/PZm6yq8Aoz:fN25/bFgK57Bu/hmtr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\VsYgYUME\\PYssgIoU.exe," 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\VsYgYUME\\PYssgIoU.exe," 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 57 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3684 IWUEwMwI.exe 2212 PYssgIoU.exe 3516 QUMswcIc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation IWUEwMwI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IWUEwMwI.exe = "C:\\Users\\Admin\\WmcMIogo\\IWUEwMwI.exe" 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PYssgIoU.exe = "C:\\ProgramData\\VsYgYUME\\PYssgIoU.exe" 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IWUEwMwI.exe = "C:\\Users\\Admin\\WmcMIogo\\IWUEwMwI.exe" IWUEwMwI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PYssgIoU.exe = "C:\\ProgramData\\VsYgYUME\\PYssgIoU.exe" PYssgIoU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PYssgIoU.exe = "C:\\ProgramData\\VsYgYUME\\PYssgIoU.exe" QUMswcIc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheStepClear.wma IWUEwMwI.exe File opened for modification C:\Windows\SysWOW64\sheUnregisterUnprotect.bmp IWUEwMwI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\WmcMIogo QUMswcIc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\WmcMIogo\IWUEwMwI QUMswcIc.exe File created C:\Windows\SysWOW64\shell32.dll.exe IWUEwMwI.exe File opened for modification C:\Windows\SysWOW64\sheStartFormat.docx IWUEwMwI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2828 reg.exe 564 reg.exe 428 reg.exe 5056 reg.exe 1204 reg.exe 2520 reg.exe 3644 reg.exe 4348 reg.exe 2664 reg.exe 1048 reg.exe 2480 reg.exe 4764 reg.exe 2984 reg.exe 4080 reg.exe 212 reg.exe 768 reg.exe 1808 reg.exe 476 reg.exe 4976 reg.exe 4764 reg.exe 3480 reg.exe 4084 reg.exe 2520 reg.exe 640 reg.exe 4796 reg.exe 3388 reg.exe 4080 reg.exe 1008 reg.exe 4724 reg.exe 1136 reg.exe 4964 reg.exe 1472 reg.exe 3656 reg.exe 4092 reg.exe 1420 reg.exe 2328 reg.exe 1340 reg.exe 1256 reg.exe 2136 reg.exe 2076 reg.exe 4588 reg.exe 4904 reg.exe 3112 reg.exe 1728 reg.exe 372 reg.exe 2408 reg.exe 3308 reg.exe 3656 reg.exe 4620 reg.exe 644 reg.exe 4032 reg.exe 4904 reg.exe 1728 reg.exe 3888 reg.exe 3388 reg.exe 1372 reg.exe 628 reg.exe 3772 reg.exe 3992 reg.exe 1396 reg.exe 4384 reg.exe 876 reg.exe 940 reg.exe 4456 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 828 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 828 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 828 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 828 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4448 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4448 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4448 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4448 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2684 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2684 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2684 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2684 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4464 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4464 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4464 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4464 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 372 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 372 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 372 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 372 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3456 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3456 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3456 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 3456 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2192 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2192 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2192 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 2192 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4548 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4548 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4548 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4548 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 216 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 216 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 216 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 216 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 1724 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 1724 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 1724 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 1724 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4992 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4992 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4992 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4992 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 628 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 628 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 628 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 628 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4340 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4340 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4340 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 4340 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3684 IWUEwMwI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe 3684 IWUEwMwI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3684 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 81 PID 2692 wrote to memory of 3684 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 81 PID 2692 wrote to memory of 3684 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 81 PID 2692 wrote to memory of 2212 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 82 PID 2692 wrote to memory of 2212 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 82 PID 2692 wrote to memory of 2212 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 82 PID 2692 wrote to memory of 4152 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 84 PID 2692 wrote to memory of 4152 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 84 PID 2692 wrote to memory of 4152 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 84 PID 2692 wrote to memory of 4212 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 92 PID 2692 wrote to memory of 4212 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 92 PID 2692 wrote to memory of 4212 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 92 PID 4152 wrote to memory of 2680 4152 cmd.exe 91 PID 4152 wrote to memory of 2680 4152 cmd.exe 91 PID 4152 wrote to memory of 2680 4152 cmd.exe 91 PID 2692 wrote to memory of 2520 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 89 PID 2692 wrote to memory of 2520 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 89 PID 2692 wrote to memory of 2520 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 89 PID 2692 wrote to memory of 476 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 88 PID 2692 wrote to memory of 476 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 88 PID 2692 wrote to memory of 476 2692 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 88 PID 2680 wrote to memory of 1188 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 94 PID 2680 wrote to memory of 1188 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 94 PID 2680 wrote to memory of 1188 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 94 PID 1188 wrote to memory of 3056 1188 cmd.exe 95 PID 1188 wrote to memory of 3056 1188 cmd.exe 95 PID 1188 wrote to memory of 3056 1188 cmd.exe 95 PID 2680 wrote to memory of 4904 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 96 PID 2680 wrote to memory of 4904 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 96 PID 2680 wrote to memory of 4904 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 96 PID 2680 wrote to memory of 1372 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 103 PID 2680 wrote to memory of 1372 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 103 PID 2680 wrote to memory of 1372 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 103 PID 2680 wrote to memory of 4796 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 102 PID 2680 wrote to memory of 4796 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 102 PID 2680 wrote to memory of 4796 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 102 PID 2680 wrote to memory of 4040 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 98 PID 2680 wrote to memory of 4040 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 98 PID 2680 wrote to memory of 4040 2680 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 98 PID 3056 wrote to memory of 3572 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 104 PID 3056 wrote to memory of 3572 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 104 PID 3056 wrote to memory of 3572 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 104 PID 3056 wrote to memory of 564 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 106 PID 3056 wrote to memory of 564 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 106 PID 3056 wrote to memory of 564 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 106 PID 3056 wrote to memory of 4764 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 107 PID 3056 wrote to memory of 4764 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 107 PID 3056 wrote to memory of 4764 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 107 PID 3056 wrote to memory of 640 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 112 PID 3056 wrote to memory of 640 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 112 PID 3056 wrote to memory of 640 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 112 PID 3056 wrote to memory of 2836 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 109 PID 3056 wrote to memory of 2836 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 109 PID 3056 wrote to memory of 2836 3056 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 109 PID 3572 wrote to memory of 828 3572 cmd.exe 114 PID 3572 wrote to memory of 828 3572 cmd.exe 114 PID 3572 wrote to memory of 828 3572 cmd.exe 114 PID 2836 wrote to memory of 4420 2836 cmd.exe 115 PID 2836 wrote to memory of 4420 2836 cmd.exe 115 PID 2836 wrote to memory of 4420 2836 cmd.exe 115 PID 4040 wrote to memory of 4200 4040 cmd.exe 116 PID 4040 wrote to memory of 4200 4040 cmd.exe 116 PID 4040 wrote to memory of 4200 4040 cmd.exe 116 PID 828 wrote to memory of 2348 828 35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe 117 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe"C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\WmcMIogo\IWUEwMwI.exe"C:\Users\Admin\WmcMIogo\IWUEwMwI.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3684
-
-
C:\ProgramData\VsYgYUME\PYssgIoU.exe"C:\ProgramData\VsYgYUME\PYssgIoU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"2⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"4⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"6⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"8⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"10⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"12⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"14⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e15⤵
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"16⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"18⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"20⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"22⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e23⤵
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"24⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"26⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"28⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e29⤵
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"30⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"32⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e33⤵PID:3620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"34⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e35⤵PID:256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"36⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e37⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"38⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e39⤵PID:1308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"40⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e41⤵PID:3632
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
PID:696
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵PID:1316
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
- Modifies registry key
PID:4620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"42⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e43⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"44⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e45⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"46⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e47⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"48⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e49⤵PID:476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"50⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e51⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"52⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e53⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"54⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e55⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"56⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e57⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"58⤵PID:3952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e59⤵PID:1800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"60⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e61⤵PID:3192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"62⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e63⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"64⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:940 -
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e65⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"66⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e67⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"68⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e69⤵PID:2988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"70⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e71⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"72⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e73⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"74⤵PID:4248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
- Modifies visibility of file extensions in Explorer
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e75⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"76⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e77⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"78⤵PID:2296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
- Modifies visibility of file extensions in Explorer
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e79⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"80⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e81⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"82⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e83⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"84⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e85⤵PID:3164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"86⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e87⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"88⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e89⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"90⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e91⤵PID:1316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"92⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e93⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"94⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e95⤵PID:428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"96⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e97⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"98⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e99⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"100⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e101⤵PID:960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"102⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e103⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"104⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e105⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"106⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e107⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"108⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e109⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"110⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e111⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"112⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e113⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e"114⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exeC:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e115⤵PID:1720
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵PID:3144
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4724
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
- UAC bypass
- Modifies registry key
PID:2480
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xUIEscsQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""114⤵PID:1056
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵PID:1816
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
- UAC bypass
PID:4284
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵PID:1900
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
- Modifies visibility of file extensions in Explorer
PID:2320
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
- Modifies visibility of file extensions in Explorer
PID:4048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ieEQAUAY.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""112⤵PID:4480
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵PID:3048
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
- UAC bypass
PID:4860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵PID:3972
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3388
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
- UAC bypass
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UUQoEUYc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""110⤵PID:4388
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵PID:3504
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
- Modifies registry key
PID:4456
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
- Modifies visibility of file extensions in Explorer
PID:3704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qsUAQYkQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""108⤵PID:824
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵PID:3180
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
- UAC bypass
PID:1408
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵
- Modifies registry key
PID:2408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mqMUgAEk.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""106⤵PID:3360
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵PID:4948
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
- UAC bypass
PID:4888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3308
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
- Modifies visibility of file extensions in Explorer
PID:1556
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵PID:3144
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
- UAC bypass
PID:5104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VeUAUgcM.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""104⤵PID:2828
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵PID:4532
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies visibility of file extensions in Explorer
PID:3992
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵PID:384
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
- UAC bypass
- Modifies registry key
PID:2328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jiUosoAE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""102⤵PID:3344
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵PID:2820
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1420
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
PID:4008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vsYQwEcg.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""100⤵PID:256
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵PID:3252
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies visibility of file extensions in Explorer
PID:4044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
- Modifies registry key
PID:372
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
PID:3744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fosgosoU.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""98⤵PID:4640
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵PID:4736
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- UAC bypass
PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZUkIsMgk.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""96⤵PID:3388
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵PID:4384
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵PID:3176
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
- Modifies visibility of file extensions in Explorer
PID:5048
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IeAgUoEw.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""94⤵PID:2496
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵PID:1416
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
- UAC bypass
PID:3452
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
- Modifies registry key
PID:1008
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies visibility of file extensions in Explorer
PID:1208
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
- UAC bypass
PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wssssIAM.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""92⤵PID:4716
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵PID:4532
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵PID:3984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies visibility of file extensions in Explorer
PID:4896
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oWsssYoI.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""90⤵PID:3860
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵PID:4936
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
PID:2328
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
- Modifies registry key
PID:3772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies visibility of file extensions in Explorer
PID:1560
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵PID:4992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:3700
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- UAC bypass
PID:4920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SEUkYAwg.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""88⤵PID:1720
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵PID:4228
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
- Modifies visibility of file extensions in Explorer
PID:4740
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵PID:3760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vUUksgYk.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""86⤵PID:4232
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵PID:996
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
- Modifies registry key
PID:4588
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
PID:3480
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
PID:680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FQQwcsgA.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""84⤵PID:4884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵PID:3464
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- UAC bypass
PID:1136
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵PID:428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JscYkcQc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""82⤵PID:444
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵PID:1888
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- UAC bypass
PID:3952
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HEskAsMI.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""80⤵PID:2812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:1016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵PID:4212
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
- Modifies registry key
PID:2828
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵PID:1664
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
- Modifies registry key
PID:4764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\isUAwEQQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""78⤵PID:4028
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵PID:2332
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵PID:1436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:996
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aykwYIII.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""76⤵PID:1904
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵PID:3700
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
PID:4488
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
- Modifies registry key
PID:4904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OIAYYEgU.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""74⤵PID:1820
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵PID:2824
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- UAC bypass
PID:2464
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zaYMMgog.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""72⤵PID:3532
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:2096
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
PID:3024
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵PID:4828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
PID:3380
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LScUwAUU.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""70⤵PID:4088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵PID:1644
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- UAC bypass
PID:1116
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵PID:1536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
- Modifies visibility of file extensions in Explorer
PID:2284
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵PID:4036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:3140
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
PID:3708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BksMkYIE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""68⤵PID:644
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵PID:800
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PIkQQMgc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""66⤵PID:2680
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵PID:4040
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
- UAC bypass
- Modifies registry key
PID:2520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
PID:212
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
PID:4600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uqsEEEgE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""64⤵PID:4696
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:4736
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- UAC bypass
PID:4712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
- Modifies registry key
PID:4080
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
PID:3476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QcwwcAwg.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""62⤵PID:2824
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:1668
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:4832
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4032
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵PID:3868
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵PID:4384
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WCwosckE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""60⤵PID:3924
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:4044
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵PID:2284
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
- Modifies registry key
PID:4348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CYIAEQgM.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""58⤵PID:2184
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:4092
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- UAC bypass
- Modifies registry key
PID:768
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies visibility of file extensions in Explorer
PID:4888 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵
- Modifies visibility of file extensions in Explorer
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\paQEcsIA.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""56⤵PID:2060
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵PID:1344
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- UAC bypass
PID:4760
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
PID:644
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BkAkAEok.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""54⤵PID:1400
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:2296
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵PID:4628
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
- Modifies registry key
PID:628
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies registry key
PID:212
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iiMkYkUc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""52⤵PID:3980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:2400
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- Modifies registry key
PID:940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- Modifies registry key
PID:1372
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KeUUAcAs.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""50⤵PID:3648
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:3828
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
PID:640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:960
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies visibility of file extensions in Explorer
PID:1504
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lMIosIQY.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""48⤵PID:2076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:1312
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:3468
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- UAC bypass
PID:2720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
PID:4384
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:876
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
PID:2152
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
- Modifies registry key
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fsUUEcUA.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""46⤵PID:4456
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:256
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
- UAC bypass
PID:3412
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\scEkgcMk.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""44⤵PID:2056
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:4548
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- UAC bypass
PID:2236
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:2940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵
- UAC bypass
PID:3992
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies registry key
PID:1396
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UAEEsUEI.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""42⤵PID:5052
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:2192
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nEkgokkQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""40⤵PID:800
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:3984
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
- Modifies registry key
PID:1048
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵PID:3308
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:4824
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:1360
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
PID:996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zSMAYwoQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""38⤵PID:4192
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:2380
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- Modifies registry key
PID:3644
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tMUwAIso.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""36⤵PID:3772
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:4828
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
PID:3784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
PID:3656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:5056
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3388
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
PID:1536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IaUsIUQQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""34⤵PID:1064
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:540
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
- Modifies registry key
PID:2136
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
PID:4268
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:4936
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
PID:3992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uSYwwYws.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""32⤵PID:3380
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:3136
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:2988
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
PID:2400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MwYgckEE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""30⤵PID:3172
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:2192
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:2420
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
PID:1900
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:4212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PaMcccgc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""28⤵PID:3984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:3632
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
PID:2812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tKAoYoAE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""26⤵PID:1304
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:3188
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:5048
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
PID:4964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OqkQcYYE.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""24⤵PID:912
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:1768
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
- Modifies registry key
PID:3656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:1472
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
PID:4544
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\caEUsgkc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""22⤵PID:1728
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:5096
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:3216
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:3744
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
PID:3112
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PqIEEoMY.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""20⤵PID:1504
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:4224
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- UAC bypass
PID:4936
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:4940
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1340
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:3632
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- Modifies registry key
PID:1256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dQkwEQwU.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""18⤵PID:2152
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:728
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2664
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:1152
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
PID:3648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ymwoEAQY.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""16⤵PID:1408
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:4764
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1136
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:4964
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
- Modifies registry key
PID:476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MoYAMIcA.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""14⤵PID:3476
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4080
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:1204
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ayQIYgoQ.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""12⤵PID:256
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:4392
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:2112
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2984
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:1808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tcwUggsw.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""10⤵PID:1484
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:380
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:1060
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:2404
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:3192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JekUAAsc.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""8⤵PID:4248
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:2116
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:4764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ieAUIkAk.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:4420
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:640
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NUwYAwwo.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4200
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:4796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1372
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- UAC bypass
PID:4628
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LGQIUIgo.bat" "C:\Users\Admin\AppData\Local\Temp\35fdfad1be130767850ad85c0e5dfcc9e60d4026fd263ae27abd411ba55f114e.exe""2⤵PID:1396
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4448
-
-
-
C:\ProgramData\dgokkoMY\QUMswcIc.exeC:\ProgramData\dgokkoMY\QUMswcIc.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:3644
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:1316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD50b6806ed67fcd0616c5f3a8315ccd042
SHA1c38742b093334948cb3a394b7cc61951ac9b3524
SHA2560ba69cbe24a90b7cbbe92d3d33d4846504fbfab057aae78136ebf317351160ac
SHA51236d412468aa26387717c3ae046e791541a425348fc1f464f5d1073459ed22688749b285c46310f9284d5771542e5a9d08f0a95a095d0966bd155808f50b151cd
-
Filesize
484KB
MD50b6806ed67fcd0616c5f3a8315ccd042
SHA1c38742b093334948cb3a394b7cc61951ac9b3524
SHA2560ba69cbe24a90b7cbbe92d3d33d4846504fbfab057aae78136ebf317351160ac
SHA51236d412468aa26387717c3ae046e791541a425348fc1f464f5d1073459ed22688749b285c46310f9284d5771542e5a9d08f0a95a095d0966bd155808f50b151cd
-
Filesize
482KB
MD50ce06685fb4c3469c71a6e2323712473
SHA1fe61fd3d7827d1d73e7b5ec4071b34f1d71c76de
SHA256e2bd2e365d3506346a15c6e97a480bc83c4206721b5740dba5ba57f4595fcfe9
SHA51297a8f51255a88a2bf927093ab21396096e54a37944781210425295785e60ff68566c8a3a38878ca707cdd78c7f6e8326e2fbc87b0d3fd9e0a34643066698bec8
-
Filesize
482KB
MD50ce06685fb4c3469c71a6e2323712473
SHA1fe61fd3d7827d1d73e7b5ec4071b34f1d71c76de
SHA256e2bd2e365d3506346a15c6e97a480bc83c4206721b5740dba5ba57f4595fcfe9
SHA51297a8f51255a88a2bf927093ab21396096e54a37944781210425295785e60ff68566c8a3a38878ca707cdd78c7f6e8326e2fbc87b0d3fd9e0a34643066698bec8
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
6KB
MD58b0271e0dc1d723ea9b9bfca72f35cb8
SHA121e0292b2a75f4ba5421e03ad29c5c6f00cd7132
SHA25666cb10ca453d7e731070da923a0f9a767f0742a4c50b0b3cc04b42e43104fa46
SHA512fbdde8fae5d182d0f07889e6a7442ea55fbae30aba66c67c1acf0158355ac0be507873436e4bbba8c3726315314d511660743a5b5e3ca2bd179d9b4854160fbe
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
488KB
MD5f278082921cce8bf82c14e662fc7d848
SHA1eb778ec118d6b1540a4c34c153bb968a2e3afb62
SHA2566c673f2e2b67338343f84ed905d86a0aae3d1fd469742db9b760966df00a3113
SHA5126f7c2362a6d563be32ec406001e5979b01bb2dcb1ea84c2b778eb20bc5cba02befa6b15100ee63149792e8ad00f15cfb6213ca0862ac5b0be476bfdd2a46539d
-
Filesize
488KB
MD5f278082921cce8bf82c14e662fc7d848
SHA1eb778ec118d6b1540a4c34c153bb968a2e3afb62
SHA2566c673f2e2b67338343f84ed905d86a0aae3d1fd469742db9b760966df00a3113
SHA5126f7c2362a6d563be32ec406001e5979b01bb2dcb1ea84c2b778eb20bc5cba02befa6b15100ee63149792e8ad00f15cfb6213ca0862ac5b0be476bfdd2a46539d