Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2022, 18:46

General

  • Target

    1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe

  • Size

    2.0MB

  • MD5

    53ca26fbcd0c54a9529dde33d5bc2042

  • SHA1

    20fd30d5957986143fca7488762e23f97f85d28a

  • SHA256

    1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

  • SHA512

    da4275c57f04fbcf3811336a46396ab754a3df91ea25a5ba3d89bf7499cfe700b65ec66ba4a8e4d374283a641e3e0e70aaf2337520e6c56b300693696b2442f6

  • SSDEEP

    24576:kxm0iO/DQ3eyqvtsJe30RxVIxplYJ1B3J7hoBTl+mRezac3hWYo7wszC9BPnfCvJ:kA0T/kwKQ0nVe+JGR0nBinx

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 21 IoCs
  • UAC bypass 3 TTPs 21 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 63 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\hOEsAEQc\meEYscIU.exe
      "C:\Users\Admin\hOEsAEQc\meEYscIU.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      PID:308
    • C:\ProgramData\pKgMgQwQ\GWYcEcws.exe
      "C:\ProgramData\pKgMgQwQ\GWYcEcws.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1764
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
        C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:660
          • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
            C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1620
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1560
              • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:696
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                  8⤵
                    PID:2036
                    • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                      C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                      9⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1616
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                        10⤵
                          PID:1356
                          • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                            C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                            11⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1728
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                              12⤵
                                PID:224
                                • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                  C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                  13⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1888
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                    14⤵
                                      PID:1420
                                      • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                        C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                        15⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:832
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                          16⤵
                                            PID:2672
                                            • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                              C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                              17⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2708
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                18⤵
                                                  PID:2280
                                                  • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                    C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                    19⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2308
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                      20⤵
                                                        PID:3016
                                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                          C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                          21⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3000
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                            22⤵
                                                              PID:2660
                                                              • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                23⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2724
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                  24⤵
                                                                    PID:2364
                                                                    • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                      25⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:2388
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                        26⤵
                                                                          PID:2156
                                                                          • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                            27⤵
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:2060
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                              28⤵
                                                                                PID:2168
                                                                                • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                  29⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2144
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                    30⤵
                                                                                      PID:2804
                                                                                      • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                        31⤵
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:2880
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                          32⤵
                                                                                            PID:2636
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                              33⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:2748
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                                34⤵
                                                                                                  PID:2540
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                                    35⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:2572
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                                      36⤵
                                                                                                        PID:2640
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                                          37⤵
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:2608
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                                            38⤵
                                                                                                              PID:2744
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                                                39⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:2784
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                                                  40⤵
                                                                                                                    PID:2316
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                                                      41⤵
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:2112
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        cmd /c "C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926"
                                                                                                                        42⤵
                                                                                                                          PID:2528
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926
                                                                                                                            43⤵
                                                                                                                              PID:2956
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                            42⤵
                                                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                                                            • Modifies registry key
                                                                                                                            PID:2020
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                            42⤵
                                                                                                                            • Modifies registry key
                                                                                                                            PID:1104
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                            42⤵
                                                                                                                            • UAC bypass
                                                                                                                            • Modifies registry key
                                                                                                                            PID:2700
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                        40⤵
                                                                                                                        • UAC bypass
                                                                                                                        • Modifies registry key
                                                                                                                        PID:2320
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                        40⤵
                                                                                                                        • Modifies registry key
                                                                                                                        PID:2224
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                        40⤵
                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                        • Modifies registry key
                                                                                                                        PID:2092
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                    38⤵
                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                    • Modifies registry key
                                                                                                                    PID:3068
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                    38⤵
                                                                                                                    • Modifies registry key
                                                                                                                    PID:3064
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                    38⤵
                                                                                                                    • UAC bypass
                                                                                                                    • Modifies registry key
                                                                                                                    PID:2108
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                36⤵
                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                • Modifies registry key
                                                                                                                PID:2020
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                36⤵
                                                                                                                • UAC bypass
                                                                                                                • Modifies registry key
                                                                                                                PID:2568
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                36⤵
                                                                                                                • Modifies registry key
                                                                                                                PID:2592
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                            34⤵
                                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                                            • Modifies registry key
                                                                                                            PID:2584
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                            34⤵
                                                                                                            • Modifies registry key
                                                                                                            PID:2596
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                            34⤵
                                                                                                            • UAC bypass
                                                                                                            • Modifies registry key
                                                                                                            PID:2700
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                        32⤵
                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                        • Modifies registry key
                                                                                                        PID:2744
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                        32⤵
                                                                                                        • Modifies registry key
                                                                                                        PID:2764
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                        32⤵
                                                                                                        • UAC bypass
                                                                                                        • Modifies registry key
                                                                                                        PID:2888
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                    30⤵
                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                    • Modifies registry key
                                                                                                    PID:2916
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                    30⤵
                                                                                                    • UAC bypass
                                                                                                    • Modifies registry key
                                                                                                    PID:2940
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                    30⤵
                                                                                                    • Modifies registry key
                                                                                                    PID:2932
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                28⤵
                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                • Modifies registry key
                                                                                                PID:2076
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                28⤵
                                                                                                • UAC bypass
                                                                                                • Modifies registry key
                                                                                                PID:2188
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                28⤵
                                                                                                • Modifies registry key
                                                                                                PID:2256
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                            26⤵
                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                            • Modifies registry key
                                                                                            PID:2172
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                            26⤵
                                                                                            • Modifies registry key
                                                                                            PID:2184
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                            26⤵
                                                                                            • UAC bypass
                                                                                            • Modifies registry key
                                                                                            PID:2204
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                        24⤵
                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                        • Modifies registry key
                                                                                        PID:2424
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                        24⤵
                                                                                        • UAC bypass
                                                                                        • Modifies registry key
                                                                                        PID:2468
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                        24⤵
                                                                                        • Modifies registry key
                                                                                        PID:2452
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                    22⤵
                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                    • Modifies registry key
                                                                                    PID:2744
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                    22⤵
                                                                                    • Modifies registry key
                                                                                    PID:2804
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                    22⤵
                                                                                    • UAC bypass
                                                                                    • Modifies registry key
                                                                                    PID:2820
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                20⤵
                                                                                • Modifies visibility of file extensions in Explorer
                                                                                • Modifies registry key
                                                                                PID:2064
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                20⤵
                                                                                • Modifies registry key
                                                                                PID:236
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                20⤵
                                                                                • UAC bypass
                                                                                • Modifies registry key
                                                                                PID:2108
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                            18⤵
                                                                            • Modifies visibility of file extensions in Explorer
                                                                            • Modifies registry key
                                                                            PID:2356
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                            18⤵
                                                                            • Modifies registry key
                                                                            PID:2372
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                            18⤵
                                                                            • UAC bypass
                                                                            • Modifies registry key
                                                                            PID:2388
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                        16⤵
                                                                        • Modifies visibility of file extensions in Explorer
                                                                        • Modifies registry key
                                                                        PID:2728
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                        16⤵
                                                                        • Modifies registry key
                                                                        PID:2740
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                        16⤵
                                                                        • UAC bypass
                                                                        • Modifies registry key
                                                                        PID:2764
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                    14⤵
                                                                    • Modifies visibility of file extensions in Explorer
                                                                    • Modifies registry key
                                                                    PID:1656
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                    14⤵
                                                                    • Modifies registry key
                                                                    PID:2056
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                    14⤵
                                                                    • UAC bypass
                                                                    • Modifies registry key
                                                                    PID:2076
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                12⤵
                                                                • Modifies visibility of file extensions in Explorer
                                                                • Modifies registry key
                                                                PID:1420
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                12⤵
                                                                • Modifies registry key
                                                                PID:832
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                12⤵
                                                                • UAC bypass
                                                                • Modifies registry key
                                                                PID:1680
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                            10⤵
                                                            • Modifies visibility of file extensions in Explorer
                                                            • Modifies registry key
                                                            PID:268
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                            10⤵
                                                            • Modifies registry key
                                                            PID:1580
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                            10⤵
                                                            • UAC bypass
                                                            • Modifies registry key
                                                            PID:1916
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                        8⤵
                                                        • Modifies visibility of file extensions in Explorer
                                                        • Modifies registry key
                                                        PID:268
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                        8⤵
                                                        • UAC bypass
                                                        • Modifies registry key
                                                        PID:1580
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                        8⤵
                                                        • Modifies registry key
                                                        PID:1540
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                    6⤵
                                                    • Modifies visibility of file extensions in Explorer
                                                    • Modifies registry key
                                                    PID:1400
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                    6⤵
                                                    • Modifies registry key
                                                    PID:1280
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                    6⤵
                                                    • UAC bypass
                                                    • Modifies registry key
                                                    PID:1728
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                4⤵
                                                • Modifies visibility of file extensions in Explorer
                                                • Modifies registry key
                                                PID:1656
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                4⤵
                                                • Modifies registry key
                                                PID:1908
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                4⤵
                                                • UAC bypass
                                                • Modifies registry key
                                                PID:1360
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                            2⤵
                                            • Modifies visibility of file extensions in Explorer
                                            • Modifies registry key
                                            PID:2016
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                            2⤵
                                            • UAC bypass
                                            • Modifies registry key
                                            PID:1724
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                            2⤵
                                            • Modifies registry key
                                            PID:1852
                                        • C:\ProgramData\LKQwYwcg\KugkwsIU.exe
                                          C:\ProgramData\LKQwYwcg\KugkwsIU.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Drops file in System32 directory
                                          PID:980
                                        • C:\Windows\system32\vssvc.exe
                                          C:\Windows\system32\vssvc.exe
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1372

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\LKQwYwcg\KugkwsIU.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          c06f7b9fe3e203dab0102575a6a5ee27

                                          SHA1

                                          6e5879daa65f781e75de37f43c6ee194495ce7a1

                                          SHA256

                                          ec0ae242c2898dbce22081e2d486fe6acfca363f1dc436d252bbcbfcfc862737

                                          SHA512

                                          581b830023eb106b7c327d8ad3655f055197c5e7972dc17b85011a17498958fbe768253c477eef2601c6f8ae0e1f9cf351e8b6af47be133f94c511ada809e6b5

                                        • C:\ProgramData\pKgMgQwQ\GWYcEcws.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          d448fa8bb30cff439ec3e186cd60488c

                                          SHA1

                                          a3716eaa3ef4f1d729d5d2e642e841d8e28e4ba0

                                          SHA256

                                          ad165e9e5eb4ca24e17e9e92d99df3e80c5442c089efecdde13096bbe95a4972

                                          SHA512

                                          6ad612439c1eb8b7e87edc83418c509f869e04177621971e45cd7967e0a0cc7eaab4ff47481b3d9bf22c1c392b273f87153faff78d8f07cb7ae0d78ce3414c66

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\AppData\Local\Temp\1cb82039822cb89811f42b2c3bdbb4256d85d66e942cd69f38d3cb123596c926

                                          Filesize

                                          6KB

                                          MD5

                                          1faaca27db89108e4db71601f485ec34

                                          SHA1

                                          0ba4ef92a3a4aa61bcc8be95e8353c7cca84855c

                                          SHA256

                                          938302353d9e5e040c36fb429ab96cd61b4e0948d1c6c027767f8ae00dc62171

                                          SHA512

                                          bd05d1a2d40a74d8049049b59c9bb6b6f99b3af0d115d5a14b8c83f8af3567b4e416517027001876821677d6464a6b3f343fd9adbf28bd196b6da97a56a9a97a

                                        • C:\Users\Admin\hOEsAEQc\meEYscIU.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          c50d3384fc0a7a3312e10f8a83cfd440

                                          SHA1

                                          49adf1159fe3d1613ac32c5cc18dbe35fd0734b5

                                          SHA256

                                          a7a502c07f76164893a527c7f3144f4b5fe37106c57151ad93f7aa4dda545488

                                          SHA512

                                          2b92510e2ed829975bc07d1f12fdfdf18f5d29802a654f26b594d22a9a1a48de9e0f38ed0cb86490364593d9e2bd139dbfa368ff54185c0aa157a46861566e6f

                                        • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

                                          Filesize

                                          145KB

                                          MD5

                                          9d10f99a6712e28f8acd5641e3a7ea6b

                                          SHA1

                                          835e982347db919a681ba12f3891f62152e50f0d

                                          SHA256

                                          70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

                                          SHA512

                                          2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

                                        • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

                                          Filesize

                                          1.0MB

                                          MD5

                                          4d92f518527353c0db88a70fddcfd390

                                          SHA1

                                          c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

                                          SHA256

                                          97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

                                          SHA512

                                          05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

                                        • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

                                          Filesize

                                          1.0MB

                                          MD5

                                          4d92f518527353c0db88a70fddcfd390

                                          SHA1

                                          c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

                                          SHA256

                                          97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

                                          SHA512

                                          05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

                                        • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

                                          Filesize

                                          818KB

                                          MD5

                                          a41e524f8d45f0074fd07805ff0c9b12

                                          SHA1

                                          948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

                                          SHA256

                                          082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

                                          SHA512

                                          91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

                                        • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE

                                          Filesize

                                          818KB

                                          MD5

                                          a41e524f8d45f0074fd07805ff0c9b12

                                          SHA1

                                          948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

                                          SHA256

                                          082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

                                          SHA512

                                          91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

                                        • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

                                          Filesize

                                          507KB

                                          MD5

                                          c87e561258f2f8650cef999bf643a731

                                          SHA1

                                          2c64b901284908e8ed59cf9c912f17d45b05e0af

                                          SHA256

                                          a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

                                          SHA512

                                          dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

                                        • \ProgramData\LKQwYwcg\KugkwsIU.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          c06f7b9fe3e203dab0102575a6a5ee27

                                          SHA1

                                          6e5879daa65f781e75de37f43c6ee194495ce7a1

                                          SHA256

                                          ec0ae242c2898dbce22081e2d486fe6acfca363f1dc436d252bbcbfcfc862737

                                          SHA512

                                          581b830023eb106b7c327d8ad3655f055197c5e7972dc17b85011a17498958fbe768253c477eef2601c6f8ae0e1f9cf351e8b6af47be133f94c511ada809e6b5

                                        • \ProgramData\pKgMgQwQ\GWYcEcws.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          d448fa8bb30cff439ec3e186cd60488c

                                          SHA1

                                          a3716eaa3ef4f1d729d5d2e642e841d8e28e4ba0

                                          SHA256

                                          ad165e9e5eb4ca24e17e9e92d99df3e80c5442c089efecdde13096bbe95a4972

                                          SHA512

                                          6ad612439c1eb8b7e87edc83418c509f869e04177621971e45cd7967e0a0cc7eaab4ff47481b3d9bf22c1c392b273f87153faff78d8f07cb7ae0d78ce3414c66

                                        • \ProgramData\pKgMgQwQ\GWYcEcws.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          d448fa8bb30cff439ec3e186cd60488c

                                          SHA1

                                          a3716eaa3ef4f1d729d5d2e642e841d8e28e4ba0

                                          SHA256

                                          ad165e9e5eb4ca24e17e9e92d99df3e80c5442c089efecdde13096bbe95a4972

                                          SHA512

                                          6ad612439c1eb8b7e87edc83418c509f869e04177621971e45cd7967e0a0cc7eaab4ff47481b3d9bf22c1c392b273f87153faff78d8f07cb7ae0d78ce3414c66

                                        • \Users\Admin\hOEsAEQc\meEYscIU.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          c50d3384fc0a7a3312e10f8a83cfd440

                                          SHA1

                                          49adf1159fe3d1613ac32c5cc18dbe35fd0734b5

                                          SHA256

                                          a7a502c07f76164893a527c7f3144f4b5fe37106c57151ad93f7aa4dda545488

                                          SHA512

                                          2b92510e2ed829975bc07d1f12fdfdf18f5d29802a654f26b594d22a9a1a48de9e0f38ed0cb86490364593d9e2bd139dbfa368ff54185c0aa157a46861566e6f

                                        • \Users\Admin\hOEsAEQc\meEYscIU.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          c50d3384fc0a7a3312e10f8a83cfd440

                                          SHA1

                                          49adf1159fe3d1613ac32c5cc18dbe35fd0734b5

                                          SHA256

                                          a7a502c07f76164893a527c7f3144f4b5fe37106c57151ad93f7aa4dda545488

                                          SHA512

                                          2b92510e2ed829975bc07d1f12fdfdf18f5d29802a654f26b594d22a9a1a48de9e0f38ed0cb86490364593d9e2bd139dbfa368ff54185c0aa157a46861566e6f

                                        • memory/308-77-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/308-64-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/308-62-0x0000000001D70000-0x0000000001DD7000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/308-76-0x0000000001D70000-0x0000000001DD7000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/696-105-0x0000000000600000-0x00000000006FF000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/696-111-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/696-142-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/832-176-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/832-146-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/832-141-0x0000000000600000-0x00000000006FF000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/980-82-0x0000000000400000-0x00000000005F3000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/980-108-0x0000000000220000-0x0000000000260000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/980-79-0x0000000000220000-0x0000000000260000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/980-115-0x0000000000400000-0x00000000005F3000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/1308-54-0x0000000001E50000-0x0000000001F4F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/1308-55-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1308-60-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/1308-61-0x0000000001E50000-0x0000000001F4F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/1308-63-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1520-85-0x00000000007F0000-0x00000000008EF000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/1520-125-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1520-94-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1616-151-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1616-116-0x0000000001EC0000-0x0000000001FBF000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/1616-117-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1620-98-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1620-133-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1728-126-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1728-121-0x0000000000860000-0x000000000095F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/1728-159-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1764-80-0x0000000000400000-0x00000000005EF000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/1764-81-0x0000000000220000-0x0000000000243000-memory.dmp

                                          Filesize

                                          140KB

                                        • memory/1764-73-0x0000000000220000-0x0000000000243000-memory.dmp

                                          Filesize

                                          140KB

                                        • memory/1764-109-0x0000000000400000-0x00000000005EF000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/1888-134-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/1888-167-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2060-191-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2060-204-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2112-214-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2112-212-0x0000000000220000-0x000000000031F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/2144-192-0x0000000001E60000-0x0000000001F5F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/2144-194-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2144-206-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2308-160-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2308-189-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2388-200-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2388-187-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2572-205-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2608-207-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2708-147-0x0000000000600000-0x00000000006FF000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/2708-152-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2708-184-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2724-172-0x0000000001D20000-0x0000000001E1F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/2724-196-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2724-177-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2748-213-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2748-201-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2748-199-0x0000000001DA0000-0x0000000001E9F000-memory.dmp

                                          Filesize

                                          1020KB

                                        • memory/2784-210-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2880-209-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2880-197-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/3000-193-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/3000-171-0x0000000000400000-0x00000000005FB000-memory.dmp

                                          Filesize

                                          2.0MB