Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
3d2d0173e3f43615c98ad7c8d05e46d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d2d0173e3f43615c98ad7c8d05e46d6.exe
Resource
win10v2004-20231215-en
General
-
Target
3d2d0173e3f43615c98ad7c8d05e46d6.exe
-
Size
436KB
-
MD5
3d2d0173e3f43615c98ad7c8d05e46d6
-
SHA1
5a29ff905d152e1953d1e4afb28759282ad497bf
-
SHA256
51af7aced48148cdd79900d18f84b76ed4794fd43d6943570eaba08f74591750
-
SHA512
7a335f43863fb77fab875321113a7966be873d93f6baa508ddb2a6d84b7e7c1b2210b37ed23f71d74207b45ca3e44a69646bb3963ad5fceb75f9104e864ebafb
-
SSDEEP
12288:k+wDF4Ko1Vs375Df8TRHpFodb1RHrQ+Rb7/a7Na1V54kl:g4Koo37wRH4BnDy7yykl
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3d2d0173e3f43615c98ad7c8d05e46d6.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2104 iMokYYos.exe 2760 qSgsIcYE.exe 2596 uuUgEYUI.exe -
Loads dropped DLL 10 IoCs
pid Process 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2760 qSgsIcYE.exe 2760 qSgsIcYE.exe 2760 qSgsIcYE.exe 2760 qSgsIcYE.exe 2760 qSgsIcYE.exe 2760 qSgsIcYE.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\iMokYYos.exe = "C:\\Users\\Admin\\aGcYgIMw\\iMokYYos.exe" iMokYYos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qSgsIcYE.exe = "C:\\ProgramData\\XAEUQwEw\\qSgsIcYE.exe" qSgsIcYE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qSgsIcYE.exe = "C:\\ProgramData\\XAEUQwEw\\qSgsIcYE.exe" uuUgEYUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\iMokYYos.exe = "C:\\Users\\Admin\\aGcYgIMw\\iMokYYos.exe" 3d2d0173e3f43615c98ad7c8d05e46d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qSgsIcYE.exe = "C:\\ProgramData\\XAEUQwEw\\qSgsIcYE.exe" 3d2d0173e3f43615c98ad7c8d05e46d6.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3d2d0173e3f43615c98ad7c8d05e46d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3d2d0173e3f43615c98ad7c8d05e46d6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\aGcYgIMw uuUgEYUI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\aGcYgIMw\iMokYYos uuUgEYUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1308 reg.exe 2140 reg.exe 3820 reg.exe 2032 reg.exe 3944 reg.exe 2368 reg.exe 544 reg.exe 2324 reg.exe 4812 reg.exe 2000 reg.exe 2284 reg.exe 956 reg.exe 1100 reg.exe 2288 reg.exe 3176 reg.exe 2812 reg.exe 3220 reg.exe 2968 reg.exe 2480 reg.exe 2944 reg.exe 584 reg.exe 1656 reg.exe 3136 reg.exe 3000 reg.exe 2660 reg.exe 2704 reg.exe 1476 reg.exe 732 reg.exe 2180 reg.exe 3540 reg.exe 580 reg.exe 3748 reg.exe 3036 reg.exe 1988 reg.exe 2976 reg.exe 3496 reg.exe 3704 reg.exe 3664 reg.exe 2644 reg.exe 584 reg.exe 3036 reg.exe 3320 reg.exe 3140 reg.exe 3552 reg.exe 1684 reg.exe 2824 reg.exe 1280 reg.exe 1052 reg.exe 2804 reg.exe 1848 reg.exe 3920 reg.exe 3548 reg.exe 564 reg.exe 2416 reg.exe 1572 reg.exe 1344 reg.exe 1652 reg.exe 3548 reg.exe 3744 reg.exe 1812 reg.exe 1332 reg.exe 2584 reg.exe 2300 reg.exe 1732 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 632 3d2d0173e3f43615c98ad7c8d05e46d6.exe 632 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2476 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2476 3d2d0173e3f43615c98ad7c8d05e46d6.exe 3048 3d2d0173e3f43615c98ad7c8d05e46d6.exe 3048 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1540 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1540 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2240 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2240 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2724 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2724 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1640 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1640 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1484 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1484 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2276 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2276 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2992 conhost.exe 2992 conhost.exe 1976 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1976 3d2d0173e3f43615c98ad7c8d05e46d6.exe 344 3d2d0173e3f43615c98ad7c8d05e46d6.exe 344 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1276 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1276 3d2d0173e3f43615c98ad7c8d05e46d6.exe 828 conhost.exe 828 conhost.exe 1056 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1056 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2008 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2008 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1132 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1132 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2980 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2980 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1504 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1504 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2468 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2468 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2112 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2112 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2040 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2040 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2720 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2720 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1304 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1304 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1952 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1952 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2712 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2712 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2332 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2332 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2116 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2116 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2140 3d2d0173e3f43615c98ad7c8d05e46d6.exe 2140 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1948 3d2d0173e3f43615c98ad7c8d05e46d6.exe 1948 3d2d0173e3f43615c98ad7c8d05e46d6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2104 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 27 PID 1704 wrote to memory of 2104 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 27 PID 1704 wrote to memory of 2104 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 27 PID 1704 wrote to memory of 2104 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 27 PID 1704 wrote to memory of 2760 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 28 PID 1704 wrote to memory of 2760 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 28 PID 1704 wrote to memory of 2760 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 28 PID 1704 wrote to memory of 2760 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 28 PID 1704 wrote to memory of 2564 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 30 PID 1704 wrote to memory of 2564 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 30 PID 1704 wrote to memory of 2564 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 30 PID 1704 wrote to memory of 2564 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 30 PID 1704 wrote to memory of 2632 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 32 PID 1704 wrote to memory of 2632 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 32 PID 1704 wrote to memory of 2632 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 32 PID 1704 wrote to memory of 2632 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 32 PID 1704 wrote to memory of 2644 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 33 PID 1704 wrote to memory of 2644 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 33 PID 1704 wrote to memory of 2644 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 33 PID 1704 wrote to memory of 2644 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 33 PID 1704 wrote to memory of 2688 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 34 PID 1704 wrote to memory of 2688 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 34 PID 1704 wrote to memory of 2688 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 34 PID 1704 wrote to memory of 2688 1704 3d2d0173e3f43615c98ad7c8d05e46d6.exe 34 PID 2564 wrote to memory of 1248 2564 cmd.exe 36 PID 2564 wrote to memory of 1248 2564 cmd.exe 36 PID 2564 wrote to memory of 1248 2564 cmd.exe 36 PID 2564 wrote to memory of 1248 2564 cmd.exe 36 PID 1248 wrote to memory of 680 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 39 PID 1248 wrote to memory of 680 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 39 PID 1248 wrote to memory of 680 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 39 PID 1248 wrote to memory of 680 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 39 PID 680 wrote to memory of 632 680 cmd.exe 41 PID 680 wrote to memory of 632 680 cmd.exe 41 PID 680 wrote to memory of 632 680 cmd.exe 41 PID 680 wrote to memory of 632 680 cmd.exe 41 PID 1248 wrote to memory of 1640 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 44 PID 1248 wrote to memory of 1640 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 44 PID 1248 wrote to memory of 1640 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 44 PID 1248 wrote to memory of 1640 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 44 PID 1248 wrote to memory of 564 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 42 PID 1248 wrote to memory of 564 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 42 PID 1248 wrote to memory of 564 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 42 PID 1248 wrote to memory of 564 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 42 PID 1248 wrote to memory of 2896 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 43 PID 1248 wrote to memory of 2896 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 43 PID 1248 wrote to memory of 2896 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 43 PID 1248 wrote to memory of 2896 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 43 PID 1248 wrote to memory of 2300 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 48 PID 1248 wrote to memory of 2300 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 48 PID 1248 wrote to memory of 2300 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 48 PID 1248 wrote to memory of 2300 1248 3d2d0173e3f43615c98ad7c8d05e46d6.exe 48 PID 632 wrote to memory of 312 632 3d2d0173e3f43615c98ad7c8d05e46d6.exe 51 PID 632 wrote to memory of 312 632 3d2d0173e3f43615c98ad7c8d05e46d6.exe 51 PID 632 wrote to memory of 312 632 3d2d0173e3f43615c98ad7c8d05e46d6.exe 51 PID 632 wrote to memory of 312 632 3d2d0173e3f43615c98ad7c8d05e46d6.exe 51 PID 2300 wrote to memory of 2172 2300 cmd.exe 50 PID 2300 wrote to memory of 2172 2300 cmd.exe 50 PID 2300 wrote to memory of 2172 2300 cmd.exe 50 PID 2300 wrote to memory of 2172 2300 cmd.exe 50 PID 312 wrote to memory of 2476 312 cmd.exe 53 PID 312 wrote to memory of 2476 312 cmd.exe 53 PID 312 wrote to memory of 2476 312 cmd.exe 53 PID 312 wrote to memory of 2476 312 cmd.exe 53 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 3d2d0173e3f43615c98ad7c8d05e46d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3d2d0173e3f43615c98ad7c8d05e46d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exe"C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\aGcYgIMw\iMokYYos.exe"C:\Users\Admin\aGcYgIMw\iMokYYos.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2104
-
-
C:\ProgramData\XAEUQwEw\qSgsIcYE.exe"C:\ProgramData\XAEUQwEw\qSgsIcYE.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2760
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d63⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"4⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d65⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"6⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d67⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"8⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d69⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"10⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d611⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"12⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d613⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"14⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d615⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"16⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d617⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"18⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d619⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"20⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d621⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"22⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d623⤵PID:2992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"24⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d625⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"26⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d627⤵
- Suspicious behavior: EnumeratesProcesses
PID:344 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"28⤵
- Modifies visibility of file extensions in Explorer
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d629⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"30⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d631⤵PID:828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"32⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d633⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"34⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d635⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"36⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d637⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"38⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d639⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"40⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d641⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"42⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d643⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"44⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d645⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"46⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d647⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"48⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d649⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"50⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d651⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"52⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d653⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"54⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d655⤵
- Modifies visibility of file extensions in Explorer
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"56⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d657⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"58⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d659⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"60⤵
- Checks whether UAC is enabled
- System policy modification
PID:340 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d661⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"62⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d663⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
PID:1860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵PID:1804
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"64⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d665⤵PID:1004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"66⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d667⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"68⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d669⤵PID:1148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"70⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d671⤵PID:1824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"72⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d673⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"74⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d675⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"76⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d677⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"78⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d679⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"80⤵
- Modifies visibility of file extensions in Explorer
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d681⤵PID:1920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"82⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d683⤵PID:2844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"84⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d685⤵
- Checks whether UAC is enabled
- System policy modification
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"86⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d687⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"88⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d689⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"90⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d691⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"92⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d693⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"94⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d695⤵PID:1456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"96⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d697⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"98⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d699⤵PID:1360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"100⤵
- Modifies visibility of file extensions in Explorer
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6101⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"102⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6103⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"104⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6105⤵PID:1248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"106⤵
- Modifies visibility of file extensions in Explorer
PID:656 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6107⤵PID:868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"108⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6109⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"110⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6111⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"112⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6113⤵PID:2136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"114⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6115⤵PID:2292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"116⤵
- Modifies visibility of file extensions in Explorer
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6117⤵PID:2476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"118⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6119⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"120⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6.exeC:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6121⤵PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3d2d0173e3f43615c98ad7c8d05e46d6"122⤵PID:1000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-