Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe
Resource
win10v2004-20220812-en
General
-
Target
bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe
-
Size
442KB
-
MD5
0e07c6d2e249d95c0b4b9249cb43ffd0
-
SHA1
6e1b1626f08ebf78dfbf34e35a5a034bb0cf25ae
-
SHA256
bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f
-
SHA512
d94937d7e04f4253080eb63eed96259de1305fd790d6bedb40885c18e5cf52b43825d4bfc73f9ff665a34721c289a5576e91a01a0e575bef6d394bd7ffd08b0b
-
SSDEEP
12288:xmjcV+OjiHpCNRbW8xEO2THk11xHF47NlsvBxwcL7mPp+P:xmkjiHpjeEO2ExH0NlsvBxwc3mw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe -
Executes dropped EXE 3 IoCs
pid Process 2296 AYwEYIgw.exe 1016 CqAwYcQw.exe 3040 hQAkAwkM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation CqAwYcQw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AYwEYIgw.exe = "C:\\Users\\Admin\\CYYwscgY\\AYwEYIgw.exe" AYwEYIgw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CqAwYcQw.exe = "C:\\ProgramData\\nIYYcMgA\\CqAwYcQw.exe" CqAwYcQw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CqAwYcQw.exe = "C:\\ProgramData\\nIYYcMgA\\CqAwYcQw.exe" hQAkAwkM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AYwEYIgw.exe = "C:\\Users\\Admin\\CYYwscgY\\AYwEYIgw.exe" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CqAwYcQw.exe = "C:\\ProgramData\\nIYYcMgA\\CqAwYcQw.exe" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe CqAwYcQw.exe File opened for modification C:\Windows\SysWOW64\sheDisableUnregister.doc CqAwYcQw.exe File opened for modification C:\Windows\SysWOW64\sheResetOut.xls CqAwYcQw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\CYYwscgY hQAkAwkM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\CYYwscgY\AYwEYIgw hQAkAwkM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4036 reg.exe 4744 reg.exe 3172 reg.exe 4716 reg.exe 3572 reg.exe 3296 reg.exe 4584 reg.exe 4712 reg.exe 2100 reg.exe 2212 reg.exe 900 reg.exe 724 reg.exe 4916 reg.exe 4536 reg.exe 4392 reg.exe 2380 reg.exe 1332 reg.exe 2928 reg.exe 5020 reg.exe 3964 reg.exe 632 reg.exe 1444 reg.exe 3340 reg.exe 2396 reg.exe 2876 reg.exe 4776 reg.exe 2756 reg.exe 4700 reg.exe 3892 reg.exe 1524 reg.exe 692 reg.exe 3784 reg.exe 4152 reg.exe 4960 reg.exe 3888 reg.exe 4304 reg.exe 2540 reg.exe 3500 reg.exe 4576 reg.exe 2308 reg.exe 3548 reg.exe 1548 reg.exe 1808 reg.exe 3544 reg.exe 4936 reg.exe 2320 reg.exe 4896 reg.exe 3596 reg.exe 908 reg.exe 4296 reg.exe 5076 reg.exe 3784 reg.exe 4860 reg.exe 2316 reg.exe 3576 reg.exe 3460 reg.exe 4868 reg.exe 2984 reg.exe 4664 reg.exe 3752 reg.exe 3924 reg.exe 648 reg.exe 3392 reg.exe 808 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3292 Conhost.exe 3292 Conhost.exe 3292 Conhost.exe 3292 Conhost.exe 5068 Conhost.exe 5068 Conhost.exe 5068 Conhost.exe 5068 Conhost.exe 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4584 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4584 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4584 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4584 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2932 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2932 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2932 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 2932 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4064 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4064 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4064 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4064 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3428 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3428 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3428 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3428 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 3920 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1600 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1600 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1600 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1600 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 4496 cmd.exe 4496 cmd.exe 4496 cmd.exe 4496 cmd.exe 1592 Conhost.exe 1592 Conhost.exe 1592 Conhost.exe 1592 Conhost.exe 4244 Conhost.exe 4244 Conhost.exe 4244 Conhost.exe 4244 Conhost.exe 4880 Conhost.exe 4880 Conhost.exe 4880 Conhost.exe 4880 Conhost.exe 3352 Conhost.exe 3352 Conhost.exe 3352 Conhost.exe 3352 Conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1016 CqAwYcQw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe 1016 CqAwYcQw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2296 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 53 PID 2432 wrote to memory of 2296 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 53 PID 2432 wrote to memory of 2296 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 53 PID 2432 wrote to memory of 1016 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 59 PID 2432 wrote to memory of 1016 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 59 PID 2432 wrote to memory of 1016 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 59 PID 2432 wrote to memory of 2140 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 657 PID 2432 wrote to memory of 2140 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 657 PID 2432 wrote to memory of 2140 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 657 PID 2432 wrote to memory of 4960 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 423 PID 2432 wrote to memory of 4960 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 423 PID 2432 wrote to memory of 4960 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 423 PID 2432 wrote to memory of 3092 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1054 PID 2432 wrote to memory of 3092 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1054 PID 2432 wrote to memory of 3092 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 1054 PID 2432 wrote to memory of 4896 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 74 PID 2432 wrote to memory of 4896 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 74 PID 2432 wrote to memory of 4896 2432 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 74 PID 2140 wrote to memory of 3292 2140 reg.exe 978 PID 2140 wrote to memory of 3292 2140 reg.exe 978 PID 2140 wrote to memory of 3292 2140 reg.exe 978 PID 3292 wrote to memory of 4280 3292 Conhost.exe 1150 PID 3292 wrote to memory of 4280 3292 Conhost.exe 1150 PID 3292 wrote to memory of 4280 3292 Conhost.exe 1150 PID 3292 wrote to memory of 1084 3292 Conhost.exe 1148 PID 3292 wrote to memory of 1084 3292 Conhost.exe 1148 PID 3292 wrote to memory of 1084 3292 Conhost.exe 1148 PID 3292 wrote to memory of 3760 3292 Conhost.exe 1147 PID 3292 wrote to memory of 3760 3292 Conhost.exe 1147 PID 3292 wrote to memory of 3760 3292 Conhost.exe 1147 PID 3292 wrote to memory of 1712 3292 Conhost.exe 1145 PID 3292 wrote to memory of 1712 3292 Conhost.exe 1145 PID 3292 wrote to memory of 1712 3292 Conhost.exe 1145 PID 3292 wrote to memory of 4496 3292 Conhost.exe 1142 PID 3292 wrote to memory of 4496 3292 Conhost.exe 1142 PID 3292 wrote to memory of 4496 3292 Conhost.exe 1142 PID 4280 wrote to memory of 5068 4280 cmd.exe 690 PID 4280 wrote to memory of 5068 4280 cmd.exe 690 PID 4280 wrote to memory of 5068 4280 cmd.exe 690 PID 4496 wrote to memory of 4088 4496 cmd.exe 375 PID 4496 wrote to memory of 4088 4496 cmd.exe 375 PID 4496 wrote to memory of 4088 4496 cmd.exe 375 PID 5068 wrote to memory of 208 5068 Conhost.exe 1141 PID 5068 wrote to memory of 208 5068 Conhost.exe 1141 PID 5068 wrote to memory of 208 5068 Conhost.exe 1141 PID 5068 wrote to memory of 4012 5068 Conhost.exe 1140 PID 5068 wrote to memory of 4012 5068 Conhost.exe 1140 PID 5068 wrote to memory of 4012 5068 Conhost.exe 1140 PID 5068 wrote to memory of 4292 5068 Conhost.exe 1139 PID 5068 wrote to memory of 4292 5068 Conhost.exe 1139 PID 5068 wrote to memory of 4292 5068 Conhost.exe 1139 PID 5068 wrote to memory of 1504 5068 Conhost.exe 1137 PID 5068 wrote to memory of 1504 5068 Conhost.exe 1137 PID 5068 wrote to memory of 1504 5068 Conhost.exe 1137 PID 5068 wrote to memory of 3796 5068 Conhost.exe 1135 PID 5068 wrote to memory of 3796 5068 Conhost.exe 1135 PID 5068 wrote to memory of 3796 5068 Conhost.exe 1135 PID 208 wrote to memory of 4804 208 cmd.exe 1134 PID 208 wrote to memory of 4804 208 cmd.exe 1134 PID 208 wrote to memory of 4804 208 cmd.exe 1134 PID 4804 wrote to memory of 4144 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 530 PID 4804 wrote to memory of 4144 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 530 PID 4804 wrote to memory of 4144 4804 bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe 530 PID 4144 wrote to memory of 4584 4144 reg.exe 1131 -
System policy modification 1 TTPs 32 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe"C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\CYYwscgY\AYwEYIgw.exe"C:\Users\Admin\CYYwscgY\AYwEYIgw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2296
-
-
C:\ProgramData\nIYYcMgA\CqAwYcQw.exe"C:\ProgramData\nIYYcMgA\CqAwYcQw.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1016
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:4896
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:2140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IOAIUAII.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1524
-
-
C:\ProgramData\MSsMUYoU\hQAkAwkM.exeC:\ProgramData\MSsMUYoU\hQAkAwkM.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3040
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:5068
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4144
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4000
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:3352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lqAMMMwM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:4984
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:2200
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4700
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:3540
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:3192
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TmooosMI.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:1792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:3980
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Modifies visibility of file extensions in Explorer
PID:3696
-
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f4⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f4⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wckUIocs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:4576
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1624
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uAAkQMgc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""5⤵PID:5004
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵PID:4784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵
- Modifies registry key
PID:3460
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:636
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:992
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:4392
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2060
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PUAMEcco.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4076
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4716
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:3552
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4496
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4244
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4576
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f4⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kYEIMcoM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""5⤵PID:4584
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:4956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:1892
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"5⤵PID:2840
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- UAC bypass
PID:724
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FKgQwskc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:3452
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3716
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:100
-
-
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1840
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:64
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mOkkQIsA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵
- Checks whether UAC is enabled
- System policy modification
PID:1344
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:3248
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵
- Modifies visibility of file extensions in Explorer
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1272
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VEoQUUEk.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:2712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4788
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- Modifies registry key
PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:100
-
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4644
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:348
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:708
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2284
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:808
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1776
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2380
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:5016
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:1180
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:4860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aWEMUEAM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4184
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2104
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:4992
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:5020
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vmgcYYYw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4600
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:1524
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1400
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4168
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3888
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4184
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4880
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GWkgwMcs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:2932
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3192
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:4256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2112
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3716
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4936
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4840
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XMcAIcAA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:528
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XSEUIUIc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:5060
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4856
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:2508
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cogAMsAU.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:3188
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:3196
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies visibility of file extensions in Explorer
PID:2984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:3108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:2484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GQokUwUs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4072
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EAEEcEQY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:1984
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:3584
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- UAC bypass
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4340
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1304
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fOQwwIww.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:5028
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:1084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:4756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4952
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GcsYkkkM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:1840
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:2340
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:4776
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4392
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:8
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ySskIEso.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1116
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2464
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3452
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:3296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qQUsYMMU.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵
- Modifies visibility of file extensions in Explorer
PID:3148
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:5088
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:5076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1548
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bQMIIAYM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1132
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Suspicious use of WriteProcessMemory
PID:2140
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sYcocgoI.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:3456
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
- Modifies registry key
PID:3576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:1928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:1244
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4928
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aiUAEssM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:3088
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:1640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hsQIUwEw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:4576
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:3832
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:4000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies registry key
PID:4392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bSkscEYM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:1504
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:1528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- UAC bypass
PID:3560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:4152
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:1728
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:3392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4708
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WYwscIcc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:3996
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4672
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4788
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2464
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jwgUYkYk.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4020
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:3544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VYskogAA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1352
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:3460
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3892
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4024
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uAIIQQUo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:3760
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:1396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:5096
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DYMkscgY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:4084
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:2380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"4⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RmMAwssY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""4⤵PID:4700
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:5092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:3012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:4916
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:8
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1424
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"4⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f5⤵PID:1796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WMAcQUUw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""6⤵PID:4340
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵PID:1168
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:3964
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:3888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"6⤵PID:3708
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\egAMkUgM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2156
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1712
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:4744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fCgQQggk.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:3548
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:632
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:4536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies registry key
PID:900 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:948
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2796
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2508
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:3172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:2604
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WQEMEEgs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1116
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:808
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1588
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lWAUEwsQ.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""4⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f5⤵PID:4432
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:3812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4052
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3392
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:3476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"4⤵PID:1532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3104
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\buEQUYEc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BmccIgoI.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f4⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:4584
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:692
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:348
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4024
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:3752
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4560
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
- Modifies registry key
PID:4712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:2984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:3148
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:4636
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lAcEQoUE.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1868
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:2200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4988
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4752
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4644
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2104
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1524
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wsMUAIYA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:5012
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- Modifies registry key
PID:3784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- Modifies registry key
PID:2308
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:1680
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:220
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2696
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Modifies visibility of file extensions in Explorer
PID:4936
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HIQckQoQ.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:732
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- UAC bypass
PID:3832
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4156
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PCosgcMs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:1392
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:1432
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:648
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:2468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lMkMwIEY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3708
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3940
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4228
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:3092
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4816 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:1792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bIUcwYEc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:2728
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4584
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3976
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UAMQIMok.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:4260
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- Modifies registry key
PID:2876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WoswUYMY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4564
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:3924
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f3⤵PID:3052
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4564
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Modifies visibility of file extensions in Explorer
PID:5076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Modifies visibility of file extensions in Explorer
PID:4464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JAEkoIkA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3784
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3344
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:460
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:3444
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1452
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bqkQYYEk.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:1332
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3192
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:3792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WqQYIgoU.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:2932
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- Modifies visibility of file extensions in Explorer
PID:900
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:4872
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:1692
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- UAC bypass
- Modifies registry key
PID:3784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1120
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aoEIkgUY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:1536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NGoIIQsQ.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:4512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2136
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:1668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:4124
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies registry key
PID:4584 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1668
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- Modifies registry key
PID:724
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Modifies visibility of file extensions in Explorer
PID:3960
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:4036
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1760
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:3052
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:3560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mMIkwkIc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""4⤵PID:3796
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:1504
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:4292
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:4012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"4⤵
- Suspicious use of WriteProcessMemory
PID:208
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:528
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3940 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:2540
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:2756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1712
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4972
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:2112
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1044
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:648 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sUAQIUos.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:1680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵
- UAC bypass
PID:1528
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵
- Modifies visibility of file extensions in Explorer
PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vcgcgIIY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:436
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4788
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4704
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mugswQIo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:4440
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3012
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ViUIowEg.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵
- Modifies visibility of file extensions in Explorer
PID:4604
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:3848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4600
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3192
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2508
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4068
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Modifies visibility of file extensions in Explorer
PID:3296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qAAEssYo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:5108
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ggYQkoQI.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:4908
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4340
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:4868 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Modifies visibility of file extensions in Explorer
PID:4824
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:4700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:788
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2236
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eGQwscco.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2284
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3972
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:240
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:1536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\emcoUMoU.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:1764
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:2380
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2472
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1792
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
- Checks whether UAC is enabled
- System policy modification
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:3536
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aussIAEo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:1036
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:1100
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4324
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4856
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5112
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f2⤵PID:1248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zKIgwoEQ.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3444
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3108
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies registry key
PID:3888
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3444
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1776
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BuwYwkog.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2008
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4420
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:228
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:1332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:4996
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jAkgMoQo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2152
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
- Modifies registry key
PID:3596
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4956
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:2316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵
- Modifies visibility of file extensions in Explorer
PID:3112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JesYAQIo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3716
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:648
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1444
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eYQQUAEo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:3668
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2096
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- UAC bypass
PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵PID:1872
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4076
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oWEoQkEA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""3⤵PID:4488
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:3240
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"3⤵PID:1660
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2184
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sQkIkMAw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3664
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3560
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2740
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:3792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GocskEEw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2492
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1472
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5064
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XQUgIUIY.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2788
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1756
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies registry key
PID:2212
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3648
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3708
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GawYsoYQ.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2152
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:5116
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:692
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:2008
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:4708
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1680
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:2876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FYIkkwUA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:5064
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4804
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies registry key
PID:808
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:1892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UAwsssQs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3460
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:2480
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies registry key
PID:1444
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:4296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4540
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DYoQwckI.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:4832
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3808
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies visibility of file extensions in Explorer
PID:3752
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:4228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4620
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:3888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pYskskYs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:920
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:4720
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4360
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:5032
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:4780
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sccsgUUA.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵
- Modifies visibility of file extensions in Explorer
PID:4128
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- UAC bypass
PID:3344
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:2344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:4464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:2336
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\veEwsgIE.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵PID:448
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:2712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- UAC bypass
- Modifies registry key
PID:3572
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oaAEkkYw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:4984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2212
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1344
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2080
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2156
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:4744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CWQIgEAE.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:388
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
- Modifies registry key
PID:3340
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies registry key
PID:3500
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:1120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QOIEUMYo.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3980
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:4616
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rgEUcoYw.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:920
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:3548
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4988
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:4716 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:3892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2336
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kqYgQsQc.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:1712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3760
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"2⤵
- Suspicious use of WriteProcessMemory
PID:4280
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pucIQYEM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:3492
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:2380
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3564
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵PID:1516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3664
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QOMcYskM.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:2904
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4512
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:2184
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
- Modifies visibility of file extensions in Explorer
PID:4468
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aEEAwUMg.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵
- Modifies visibility of file extensions in Explorer
PID:3092
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:4256
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:692
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:1448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:2396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ESUUUAQs.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3812
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f"1⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:2316
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2932
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4548
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:4036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NYMwowMU.bat" "C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exe""1⤵PID:4188
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:3312
-
C:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f.exeC:\Users\Admin\AppData\Local\Temp\bbe9dac74cda5a7a79dfaf67c1008285fb8e8e0d803b2573abf309afe7b63d5f1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4804
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
434KB
MD53e14ac217a9f8c4e76ab0bec54413488
SHA16cdc10b1155dcc3afc8674370b8fcb0a23d1eaed
SHA256cae541bdb43e00e35eeb1d55f05e2da505d204cdad05f4f3d6401da9f9e7767b
SHA51264ebaca668d99e31f7fa92d00f53c71681ec964a1020b08c868a921b942bcc13cb480ea7effbab245674a2ff2b22786c7ad21d6a8acf2d700d2196e4f9e8d475
-
Filesize
434KB
MD53e14ac217a9f8c4e76ab0bec54413488
SHA16cdc10b1155dcc3afc8674370b8fcb0a23d1eaed
SHA256cae541bdb43e00e35eeb1d55f05e2da505d204cdad05f4f3d6401da9f9e7767b
SHA51264ebaca668d99e31f7fa92d00f53c71681ec964a1020b08c868a921b942bcc13cb480ea7effbab245674a2ff2b22786c7ad21d6a8acf2d700d2196e4f9e8d475
-
Filesize
434KB
MD58658d134b30644a8aff6ab18943b9160
SHA10096b2a02d3cfe36176a2ee8a20aed6c387bee1c
SHA256e51cca11851f15fec866dbb5c2d77ca54918f7c63c46db60ccb34fd941d45291
SHA512913e6cd80f9228a17f9476d9cfc330bab5c80e9d4ef4bc670f95eef67e35f8415a4457b99b860e2731cbeb6c37417951e5090af79844bbbe6be17599b4dcac66
-
Filesize
434KB
MD58658d134b30644a8aff6ab18943b9160
SHA10096b2a02d3cfe36176a2ee8a20aed6c387bee1c
SHA256e51cca11851f15fec866dbb5c2d77ca54918f7c63c46db60ccb34fd941d45291
SHA512913e6cd80f9228a17f9476d9cfc330bab5c80e9d4ef4bc670f95eef67e35f8415a4457b99b860e2731cbeb6c37417951e5090af79844bbbe6be17599b4dcac66
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
6KB
MD5bdf926b971c6dacb62c5c764b548f850
SHA1daf9c28f324a1b0d9886021ad63d84b468cbac20
SHA2568dd31725432fd800dc2ff4a95567e2d8c8391385686ad0fe88bc480864e8ddda
SHA512cd7b29d5edb69d0c5642a2c6a7632509503956be80aaf8750f505673bd2c3e5200718412a2f43c8071ed032a35f78480db17d17138de19470e0606567db3f3d0
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
431KB
MD5ed76fdf477c38be1222daeca394125ef
SHA17e62a1bdf5facd0d97c5a04b0a98a798945b89f9
SHA256636a193bb485e9a2cdaa00753eda906a252a5a928a5b1a491d9225b6f212d4fa
SHA5122816bd75bfb56b45401d0f89a3e08f693c7854c22ff49a76313735220bcbf9fabd69c6597a0455d9e6c62c6f49d6d16d65497d26821259d39716f77fdf8613dd
-
Filesize
431KB
MD5ed76fdf477c38be1222daeca394125ef
SHA17e62a1bdf5facd0d97c5a04b0a98a798945b89f9
SHA256636a193bb485e9a2cdaa00753eda906a252a5a928a5b1a491d9225b6f212d4fa
SHA5122816bd75bfb56b45401d0f89a3e08f693c7854c22ff49a76313735220bcbf9fabd69c6597a0455d9e6c62c6f49d6d16d65497d26821259d39716f77fdf8613dd