Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
59d65b40d99242dc935249816980bf00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59d65b40d99242dc935249816980bf00.exe
Resource
win10v2004-20231215-en
General
-
Target
59d65b40d99242dc935249816980bf00.exe
-
Size
480KB
-
MD5
59d65b40d99242dc935249816980bf00
-
SHA1
12ad7fcf1a9abaafe1af7e17eb0bcbec4fde6d63
-
SHA256
2d8e507da798ba582c0a556f874bd6357a769104f18696f4f7a73ef7d404aabc
-
SHA512
127dc224e397ca3f368b49067a56cad73e6d0616dbdb9c2bcfc468f1dc82ea1ecf23fd6445e80f33c9d19109874cb913f4c31f004df6ec9469e8eec226880fd7
-
SSDEEP
12288:+4hbTlQe4tPgQeOwJaivK9HobH/BzEOjAikgX6Gzjcgq4:zhlQ3tP5Lobf3lkQzjy4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 53 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" TrustedInstaller.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation GQoEUIoM.exe -
Executes dropped EXE 3 IoCs
pid Process 2272 GQoEUIoM.exe 712 rOUoAMQU.exe 3284 CYYYQkcI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GQoEUIoM.exe = "C:\\Users\\Admin\\iOYwEEMs\\GQoEUIoM.exe" GQoEUIoM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rOUoAMQU.exe = "C:\\ProgramData\\tMoMIcYY\\rOUoAMQU.exe" rOUoAMQU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rOUoAMQU.exe = "C:\\ProgramData\\tMoMIcYY\\rOUoAMQU.exe" CYYYQkcI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GQoEUIoM.exe = "C:\\Users\\Admin\\iOYwEEMs\\GQoEUIoM.exe" 59d65b40d99242dc935249816980bf00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rOUoAMQU.exe = "C:\\ProgramData\\tMoMIcYY\\rOUoAMQU.exe" 59d65b40d99242dc935249816980bf00.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 59d65b40d99242dc935249816980bf00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 59d65b40d99242dc935249816980bf00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\iOYwEEMs\GQoEUIoM CYYYQkcI.exe File created C:\Windows\SysWOW64\shell32.dll.exe GQoEUIoM.exe File opened for modification C:\Windows\SysWOW64\shePushInitialize.gif GQoEUIoM.exe File opened for modification C:\Windows\SysWOW64\sheResumeMerge.xlsb GQoEUIoM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\iOYwEEMs CYYYQkcI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1064 reg.exe 4876 reg.exe 2972 reg.exe 3436 reg.exe 1928 reg.exe 5096 reg.exe 4372 reg.exe 4492 reg.exe 4512 reg.exe 3244 reg.exe 3060 reg.exe 4072 reg.exe 1944 reg.exe 4468 reg.exe 2936 reg.exe 348 reg.exe 644 reg.exe 3964 reg.exe 4100 reg.exe 4700 reg.exe 5068 reg.exe 2564 reg.exe 1260 reg.exe 4468 reg.exe 544 reg.exe 3968 reg.exe 1576 reg.exe 3060 reg.exe 3540 reg.exe 1384 reg.exe 4724 reg.exe 2696 reg.exe 2348 reg.exe 992 reg.exe 392 reg.exe 3424 reg.exe 1928 reg.exe 4500 reg.exe 4196 reg.exe 1264 reg.exe 1736 reg.exe 1972 reg.exe 2336 reg.exe 3940 reg.exe 224 reg.exe 3724 reg.exe 3008 reg.exe 3912 reg.exe 396 reg.exe 1260 reg.exe 800 reg.exe 2880 reg.exe 4936 reg.exe 2588 reg.exe 4824 reg.exe 3064 reg.exe 4720 reg.exe 4348 reg.exe 2096 reg.exe 220 reg.exe 3584 reg.exe 1612 reg.exe 4492 reg.exe 464 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 59d65b40d99242dc935249816980bf00.exe 1692 59d65b40d99242dc935249816980bf00.exe 1692 59d65b40d99242dc935249816980bf00.exe 1692 59d65b40d99242dc935249816980bf00.exe 4584 59d65b40d99242dc935249816980bf00.exe 4584 59d65b40d99242dc935249816980bf00.exe 4584 59d65b40d99242dc935249816980bf00.exe 4584 59d65b40d99242dc935249816980bf00.exe 3584 59d65b40d99242dc935249816980bf00.exe 3584 59d65b40d99242dc935249816980bf00.exe 3584 59d65b40d99242dc935249816980bf00.exe 3584 59d65b40d99242dc935249816980bf00.exe 3560 59d65b40d99242dc935249816980bf00.exe 3560 59d65b40d99242dc935249816980bf00.exe 3560 59d65b40d99242dc935249816980bf00.exe 3560 59d65b40d99242dc935249816980bf00.exe 560 Conhost.exe 560 Conhost.exe 560 Conhost.exe 560 Conhost.exe 3760 59d65b40d99242dc935249816980bf00.exe 3760 59d65b40d99242dc935249816980bf00.exe 3760 59d65b40d99242dc935249816980bf00.exe 3760 59d65b40d99242dc935249816980bf00.exe 4040 Conhost.exe 4040 Conhost.exe 4040 Conhost.exe 4040 Conhost.exe 2172 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 3328 59d65b40d99242dc935249816980bf00.exe 3328 59d65b40d99242dc935249816980bf00.exe 3328 59d65b40d99242dc935249816980bf00.exe 3328 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 2172 59d65b40d99242dc935249816980bf00.exe 4828 Conhost.exe 4828 Conhost.exe 4828 Conhost.exe 4828 Conhost.exe 1588 reg.exe 1588 reg.exe 1588 reg.exe 1588 reg.exe 1960 Conhost.exe 1960 Conhost.exe 1960 Conhost.exe 1960 Conhost.exe 464 cscript.exe 464 cscript.exe 464 cscript.exe 464 cscript.exe 4512 cscript.exe 4512 cscript.exe 4512 cscript.exe 4512 cscript.exe 3628 cmd.exe 3628 cmd.exe 3628 cmd.exe 3628 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2272 GQoEUIoM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe 2272 GQoEUIoM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2272 1692 59d65b40d99242dc935249816980bf00.exe 88 PID 1692 wrote to memory of 2272 1692 59d65b40d99242dc935249816980bf00.exe 88 PID 1692 wrote to memory of 2272 1692 59d65b40d99242dc935249816980bf00.exe 88 PID 1692 wrote to memory of 712 1692 59d65b40d99242dc935249816980bf00.exe 89 PID 1692 wrote to memory of 712 1692 59d65b40d99242dc935249816980bf00.exe 89 PID 1692 wrote to memory of 712 1692 59d65b40d99242dc935249816980bf00.exe 89 PID 1692 wrote to memory of 1384 1692 59d65b40d99242dc935249816980bf00.exe 93 PID 1692 wrote to memory of 1384 1692 59d65b40d99242dc935249816980bf00.exe 93 PID 1692 wrote to memory of 1384 1692 59d65b40d99242dc935249816980bf00.exe 93 PID 1692 wrote to memory of 4484 1692 59d65b40d99242dc935249816980bf00.exe 95 PID 1692 wrote to memory of 4484 1692 59d65b40d99242dc935249816980bf00.exe 95 PID 1692 wrote to memory of 4484 1692 59d65b40d99242dc935249816980bf00.exe 95 PID 1692 wrote to memory of 3724 1692 59d65b40d99242dc935249816980bf00.exe 97 PID 1692 wrote to memory of 3724 1692 59d65b40d99242dc935249816980bf00.exe 97 PID 1692 wrote to memory of 3724 1692 59d65b40d99242dc935249816980bf00.exe 97 PID 1692 wrote to memory of 2936 1692 59d65b40d99242dc935249816980bf00.exe 96 PID 1692 wrote to memory of 2936 1692 59d65b40d99242dc935249816980bf00.exe 96 PID 1692 wrote to memory of 2936 1692 59d65b40d99242dc935249816980bf00.exe 96 PID 1384 wrote to memory of 4584 1384 cmd.exe 101 PID 1384 wrote to memory of 4584 1384 cmd.exe 101 PID 1384 wrote to memory of 4584 1384 cmd.exe 101 PID 4584 wrote to memory of 652 4584 59d65b40d99242dc935249816980bf00.exe 102 PID 4584 wrote to memory of 652 4584 59d65b40d99242dc935249816980bf00.exe 102 PID 4584 wrote to memory of 652 4584 59d65b40d99242dc935249816980bf00.exe 102 PID 4584 wrote to memory of 3896 4584 59d65b40d99242dc935249816980bf00.exe 104 PID 4584 wrote to memory of 3896 4584 59d65b40d99242dc935249816980bf00.exe 104 PID 4584 wrote to memory of 3896 4584 59d65b40d99242dc935249816980bf00.exe 104 PID 4584 wrote to memory of 4952 4584 59d65b40d99242dc935249816980bf00.exe 105 PID 4584 wrote to memory of 4952 4584 59d65b40d99242dc935249816980bf00.exe 105 PID 4584 wrote to memory of 4952 4584 59d65b40d99242dc935249816980bf00.exe 105 PID 4584 wrote to memory of 2696 4584 59d65b40d99242dc935249816980bf00.exe 106 PID 4584 wrote to memory of 2696 4584 59d65b40d99242dc935249816980bf00.exe 106 PID 4584 wrote to memory of 2696 4584 59d65b40d99242dc935249816980bf00.exe 106 PID 4584 wrote to memory of 1048 4584 59d65b40d99242dc935249816980bf00.exe 107 PID 4584 wrote to memory of 1048 4584 59d65b40d99242dc935249816980bf00.exe 107 PID 4584 wrote to memory of 1048 4584 59d65b40d99242dc935249816980bf00.exe 107 PID 652 wrote to memory of 3584 652 cmd.exe 112 PID 652 wrote to memory of 3584 652 cmd.exe 112 PID 652 wrote to memory of 3584 652 cmd.exe 112 PID 3584 wrote to memory of 2876 3584 59d65b40d99242dc935249816980bf00.exe 114 PID 3584 wrote to memory of 2876 3584 59d65b40d99242dc935249816980bf00.exe 114 PID 3584 wrote to memory of 2876 3584 59d65b40d99242dc935249816980bf00.exe 114 PID 3584 wrote to memory of 3900 3584 59d65b40d99242dc935249816980bf00.exe 116 PID 3584 wrote to memory of 3900 3584 59d65b40d99242dc935249816980bf00.exe 116 PID 3584 wrote to memory of 3900 3584 59d65b40d99242dc935249816980bf00.exe 116 PID 3584 wrote to memory of 348 3584 59d65b40d99242dc935249816980bf00.exe 117 PID 3584 wrote to memory of 348 3584 59d65b40d99242dc935249816980bf00.exe 117 PID 3584 wrote to memory of 348 3584 59d65b40d99242dc935249816980bf00.exe 117 PID 3584 wrote to memory of 4372 3584 59d65b40d99242dc935249816980bf00.exe 118 PID 3584 wrote to memory of 4372 3584 59d65b40d99242dc935249816980bf00.exe 118 PID 3584 wrote to memory of 4372 3584 59d65b40d99242dc935249816980bf00.exe 118 PID 3584 wrote to memory of 2736 3584 59d65b40d99242dc935249816980bf00.exe 119 PID 3584 wrote to memory of 2736 3584 59d65b40d99242dc935249816980bf00.exe 119 PID 3584 wrote to memory of 2736 3584 59d65b40d99242dc935249816980bf00.exe 119 PID 1048 wrote to memory of 1828 1048 cmd.exe 124 PID 1048 wrote to memory of 1828 1048 cmd.exe 124 PID 1048 wrote to memory of 1828 1048 cmd.exe 124 PID 2876 wrote to memory of 3560 2876 cmd.exe 125 PID 2876 wrote to memory of 3560 2876 cmd.exe 125 PID 2876 wrote to memory of 3560 2876 cmd.exe 125 PID 2736 wrote to memory of 4732 2736 cmd.exe 126 PID 2736 wrote to memory of 4732 2736 cmd.exe 126 PID 2736 wrote to memory of 4732 2736 cmd.exe 126 PID 3560 wrote to memory of 1352 3560 59d65b40d99242dc935249816980bf00.exe 127 -
System policy modification 1 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 59d65b40d99242dc935249816980bf00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 59d65b40d99242dc935249816980bf00.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 59d65b40d99242dc935249816980bf00.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe"C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\iOYwEEMs\GQoEUIoM.exe"C:\Users\Admin\iOYwEEMs\GQoEUIoM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2272
-
-
C:\ProgramData\tMoMIcYY\rOUoAMQU.exe"C:\ProgramData\tMoMIcYY\rOUoAMQU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf003⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"4⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf005⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"6⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf007⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"8⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf009⤵PID:560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"10⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0011⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"12⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0013⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"14⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0015⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"16⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0017⤵PID:3328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"18⤵PID:1820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0019⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"20⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0021⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"22⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0023⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"24⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0025⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"26⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0027⤵PID:464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"28⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0029⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"30⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0031⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"32⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0033⤵PID:2880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"34⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0035⤵PID:3036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"36⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0037⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"38⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0039⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"40⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0041⤵PID:452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"42⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0043⤵PID:564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"44⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0045⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"46⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0047⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"48⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0049⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"50⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0051⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"52⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0053⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"54⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0055⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"56⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0057⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"58⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0059⤵PID:684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"60⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0061⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"62⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0063⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"64⤵PID:3268
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0065⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"66⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0067⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"68⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0069⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"70⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0071⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"72⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0073⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"74⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0075⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"76⤵PID:4372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0077⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"78⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0079⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"80⤵PID:780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0081⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"82⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0083⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"84⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0085⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"86⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0087⤵
- Modifies visibility of file extensions in Explorer
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"88⤵
- Modifies visibility of file extensions in Explorer
PID:732 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0089⤵PID:1464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"90⤵PID:1696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0091⤵PID:1268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"92⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0093⤵
- Modifies visibility of file extensions in Explorer
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"94⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0095⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"96⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0097⤵PID:2572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"98⤵PID:3320
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf0099⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"100⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00101⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"102⤵
- Modifies visibility of file extensions in Explorer
PID:2044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00103⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"104⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00105⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"106⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:5068 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00107⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"108⤵PID:860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵
- Modifies visibility of file extensions in Explorer
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00109⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"110⤵PID:1684
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵
- Modifies visibility of file extensions in Explorer
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00111⤵
- Modifies visibility of file extensions in Explorer
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"112⤵PID:1268
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00113⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00"114⤵PID:1000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵
- Modifies visibility of file extensions in Explorer
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exeC:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00115⤵PID:1280
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
- UAC bypass
- Modifies registry key
PID:5096 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:1828
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵PID:1228
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:2208 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵
- UAC bypass
PID:2308
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bEoQAkAA.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""114⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:436
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵PID:860
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
- UAC bypass
PID:1704 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵
- UAC bypass
PID:4796
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵
- Modifies registry key
PID:4724
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\skowIQcQ.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""112⤵PID:5072
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1264
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
- UAC bypass
PID:2704
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵
- UAC bypass
PID:800
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
- Modifies visibility of file extensions in Explorer
PID:228
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵
- Modifies registry key
PID:1384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pkwYEoQo.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""110⤵PID:4672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵
- Modifies visibility of file extensions in Explorer
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
- UAC bypass
PID:1844
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
- Modifies registry key
PID:3064
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wEkowokk.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""108⤵PID:848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵
- Modifies visibility of file extensions in Explorer
PID:644
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵PID:3904
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵PID:4336
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
- Modifies visibility of file extensions in Explorer
PID:2936
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
- Modifies visibility of file extensions in Explorer
PID:1736
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
- Modifies registry key
PID:3964 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BoMkMggo.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""106⤵
- Modifies visibility of file extensions in Explorer
PID:4348 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵PID:3736
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵PID:4108
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵PID:2208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:2880
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
- Modifies registry key
PID:224
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
- Modifies registry key
PID:4936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lskgMEEI.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""104⤵PID:4828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
- UAC bypass
PID:2828
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵PID:548
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies visibility of file extensions in Explorer
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cewEIIYE.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""102⤵PID:2280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵PID:4720
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
- UAC bypass
PID:3676
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵PID:452
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
PID:5080 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:5028
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RoYAIkcY.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""100⤵PID:3168
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵PID:4584
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵PID:4656
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XiwMsMYM.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""98⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:992 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵PID:2696
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
PID:3144 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:220
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
- Modifies visibility of file extensions in Explorer
PID:4824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies visibility of file extensions in Explorer
PID:2384
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nEQgoQkc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""96⤵PID:3424
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵PID:1436
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:2972 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵
- Modifies visibility of file extensions in Explorer
PID:3008
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵PID:1260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
- Modifies visibility of file extensions in Explorer
PID:4800
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
- UAC bypass
PID:3172
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tMcosEME.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""94⤵PID:436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4392
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3540
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
- Modifies registry key
PID:2880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VecowQkQ.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""92⤵PID:548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:684
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵PID:2096
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
- UAC bypass
PID:4740
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4468
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
- UAC bypass
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aWEEAUsc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""90⤵PID:3940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:60
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵PID:1488
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
PID:3312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies registry key
PID:1260
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OsEsUMAE.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""88⤵PID:1228
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵PID:3320
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵PID:2704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵
- UAC bypass
PID:3964
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵PID:4832
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies registry key
PID:644
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
- Modifies registry key
PID:2096 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵
- Modifies visibility of file extensions in Explorer
PID:1064
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵PID:2316
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dWsIwsQI.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""86⤵PID:1840
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
PID:1928 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
- UAC bypass
PID:564
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- Modifies registry key
PID:800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\COMsgMoE.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""84⤵PID:2168
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵PID:392
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies registry key
PID:4348 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵
- Modifies visibility of file extensions in Explorer
PID:1264
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:3948
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
- UAC bypass
- Modifies registry key
PID:1972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wwUIgYks.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""82⤵PID:5116
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
- Modifies visibility of file extensions in Explorer
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tEAkQcso.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""80⤵PID:3936
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵PID:4088
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies registry key
PID:4500
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mcEcoIoI.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""78⤵PID:2500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:5092
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵PID:4656
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
- UAC bypass
- Modifies registry key
PID:3436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
- Modifies registry key
PID:4468
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
- Modifies registry key
PID:3008
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PesAMAkA.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""76⤵PID:4720
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2564
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- Modifies registry key
PID:1944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵PID:3912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4340
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies registry key
PID:1260 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:5116
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵PID:732
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵PID:3280
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- Modifies registry key
PID:4072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fIkcMwsk.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""74⤵
- Modifies visibility of file extensions in Explorer
PID:1688 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵PID:3948
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:4100
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
- UAC bypass
PID:3352
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵PID:564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vEogUkMU.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""72⤵PID:4500
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵PID:4052
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
- Modifies registry key
PID:2972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LcMgAsYE.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""70⤵PID:3048
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
- UAC bypass
PID:348
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵PID:2816
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵PID:756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
- Modifies registry key
PID:1928
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UQQkEkwM.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""68⤵PID:1244
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵PID:3680
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
PID:3848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
- Modifies registry key
PID:4876
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
- Modifies visibility of file extensions in Explorer
PID:1976
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵PID:2828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:1876
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵PID:3040
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵PID:1064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XIYYcIsc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""66⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1828 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵PID:228
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
PID:1804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵PID:4332
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- Modifies registry key
PID:3424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kicMksgI.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""64⤵PID:1588
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:4088
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵PID:3008
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:4052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mAAMcwwo.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""62⤵PID:2836
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:2576
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵PID:1660
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fmAQgwAg.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""60⤵PID:848
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:2856
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:3060
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵PID:2592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies registry key
PID:1064
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HEkkgMoc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""58⤵PID:2936
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:60
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:3424
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵PID:3172
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
- Modifies registry key
PID:392
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵PID:3076
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mKcMsEkQ.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""56⤵PID:5060
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵PID:3560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- Modifies registry key
PID:3540
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
PID:396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3244
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- Modifies registry key
PID:2564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sgsccgEg.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""54⤵PID:5072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
- UAC bypass
PID:3912
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:2828
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DWwIEMwM.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""52⤵PID:5096
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵
- Modifies visibility of file extensions in Explorer
PID:3144
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4904
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
PID:5076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵PID:1576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies registry key
PID:4512
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies registry key
PID:5068
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
PID:3912
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- Modifies registry key
PID:992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tscMksIU.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""50⤵PID:3868
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:4348
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵PID:3424
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵PID:1668
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- Modifies registry key
PID:348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kagEwMUQ.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""48⤵PID:5092
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:1736
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵PID:3984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jmAgQgIE.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""46⤵PID:4712
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
- Modifies visibility of file extensions in Explorer
PID:2512
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:264
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies registry key
PID:464
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\POkcsUgo.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""44⤵PID:1372
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:1704
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵PID:2548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:4024
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
- Modifies registry key
PID:1736
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies registry key
PID:3060
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vGwoUwkk.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""42⤵PID:3540
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:1840
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:4348
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:3492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:4484
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
PID:1708 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QyUUAUME.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""40⤵PID:1280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:2348
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:3940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵PID:1688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:1400
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BiAQcIsc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""38⤵PID:4832
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:4148
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵PID:4796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
- Modifies registry key
PID:1576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Modifies registry key
PID:4492
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oowoUIIc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""36⤵PID:756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:4936
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:3868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV138⤵
- UAC bypass
PID:4328
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:3352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:4576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:4904
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zawAoogQ.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""34⤵PID:4052
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:4024
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
PID:2308
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:2280
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:4868
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
PID:4700
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:1264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OMQQkQMI.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""32⤵PID:3048
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:3552
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵PID:1064
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:488
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZQEUgIgU.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""30⤵PID:4344
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:5096
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- Modifies registry key
PID:4100
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iQsokYEY.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""28⤵PID:1984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:3356
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵PID:4328
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:1280
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵PID:2040
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eMQsMskw.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""26⤵PID:3320
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:888
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵PID:4904
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:3116
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
PID:4872
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MOogwckk.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""24⤵PID:3936
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:1436
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵PID:1264
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:416
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1612
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies registry key
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sskwYQQQ.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""22⤵PID:4876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵
- Modifies visibility of file extensions in Explorer
PID:2336
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:3744
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- Modifies registry key
PID:3968 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:5092
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
- Modifies registry key
PID:4720
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zggUYEcU.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""20⤵PID:4352
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:452
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
PID:4492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
PID:4196
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
PID:1264
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\awAgUkQE.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""18⤵PID:3576
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:5016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵PID:2308
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:4712
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
PID:544
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MoEocUoc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""16⤵PID:4936
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:1876
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:1828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:3336
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:3144
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pmgYYEYY.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""14⤵PID:2208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵
- Modifies visibility of file extensions in Explorer
PID:220
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:4196
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵PID:3912
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:4956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:3800
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jCwYoYUU.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""12⤵PID:1400
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:732
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
PID:3584
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:5092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AIcAYUkw.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""10⤵PID:1548
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:684
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:2348
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies registry key
PID:2336
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kCkwYQcg.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""8⤵PID:4672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:3996
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:2588
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:1244
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:3900
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:348
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YQwgIgYo.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:4732
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:3896
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:4952
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XEwsMIQc.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1828
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4484
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:2936
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:3724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZWoosswI.bat" "C:\Users\Admin\AppData\Local\Temp\59d65b40d99242dc935249816980bf00.exe""2⤵PID:5096
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1548
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3984
-
-
-
C:\ProgramData\uaQcIYMk\CYYYQkcI.exeC:\ProgramData\uaQcIYMk\CYYYQkcI.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:4700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4576
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:544
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 948f32b8f06a35a05ec06311f178f786 3dksK9bAC0uWh9gThfknXA.0.1.0.0.01⤵PID:4344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3552
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2572
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Modifies visibility of file extensions in Explorer
PID:3064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5b9427ed768bf42583578bfa57e9543f6
SHA1cc03c9fb31ed5e3294289772a92b4d20cee4472a
SHA2568c33a28cdffcadf2aee92a4a4975b009925b97ed73ce2e0643bd2dbf1a2673d1
SHA5129275c2c86f4def27ce5be19c4440fc7859b0217dc49f9b98d7cfd4427ada48cdb7aca6005711480ded12c355da0c2839b0d55561be923adacac616d2999de331
-
Filesize
433KB
MD5f3a51031734865d337b687adb1822ede
SHA18edb5d46e08dd60fc990bbd7da8d0f8c13d9863b
SHA256d8df99e597e080a31b6ce2ac550dbc683ae7fcde2415fa38d3b936d67e17b466
SHA51259093413b8922e71f99728d18e699c7e989dec5f16831cd300b82e0419e5d658c0b9ee29580ec152287cdc00d705b75ad8f96da232311aea2df2d0bedffb309f
-
Filesize
438KB
MD50dd67dd17335cdf4e232daaf36d4796d
SHA1f2d146d46a877ff6e80b95e50d30fc807b5e2c14
SHA2562343f37abf761b8fe6603060b4e0800adc4ee7d74b5dcf260dc9e685d2d8353b
SHA512ba702870b51a66dc78530e53da284da99095584b753dd765f8bb5af21458b2a923af158778d6e370fd5e90de9c2cb204f769784398c62bcb7956d634c2457c6b
-
Filesize
48KB
MD53b20f5e18b71fcd1d72cfc04349c721f
SHA13438a78d3c3b5a9c65a0f5f1d0110adda4d501f3
SHA2568bf0705e02cfee4457efbaef3cc5f5aeb680d20dcbd7c8d893f386da85baafa4
SHA512d7eed3b09ebcd4d9e9dacb4f306d5dea2283ac855242dbb66236547666a0699844a85b3edc21ef0b5313ad050465dd2b7184f8cf0b264b981fc85bdd455cde28
-
Filesize
439KB
MD53fecf3eee53f59c808b48a857b067b56
SHA134023ad4e54a5a5668a1757379c8ae444b9d19ee
SHA2564a35ea7ef0eda7d2234a9359afc8ca841cf3c65eead65f46322b718a6d2bd982
SHA512e5f1f9a35e44762aedb9c675b346c3468d21512d101f1fe62e921ee31d2ba0a206be6ef7b798d928c7cf4820efd8f84111a1f9384e9bf7405909529f6f6d3ba9
-
Filesize
434KB
MD51a35f7aaae8d6b972a80ab4c32975380
SHA1e1cf8486ff824707a17944de0db561967bbf023a
SHA25655b4bd49f24d7c2a4a0cacc829dcd621f79a7bcc7bb1da8e2cba2328a10ccdc3
SHA5126fc4e8bc7cb94c87486b242b0c0f07e4d4ca52e8baa5365ae41c6d653c7280c5b6010d9bfbb0781096a5523ac301666f314da5b212bb40b9caa80795f0d0e982
-
Filesize
1.0MB
MD53c6cbba327e81259b6cf693124a6b9d4
SHA14652b66b0d112bb6e43d091529ebb4956ad3bca6
SHA256faccf70043fad50af6e0ecf17f81ad9f73739256daf911dbd35989d0f5a8c1c1
SHA5129cae1defa5a85559529c3835a86883e446b44922f6016a02574df83656edddf3517e32d19823150eb3ed9bbf93d45f6c1c5d4f55daa9c7d6964da51db60e2da9
-
Filesize
439KB
MD5162f025b161f6852c39cd694596fed7f
SHA1f29ddc805c708907b127b219e5a4523d4aec7c5a
SHA256147a38477ad4aad8d58a6dae24172a9b41f9535e25f3acffd3837151840995bc
SHA5121157670c2910a2d4e5afe1ff99428753348f828d45b85ac729bed8666e05150e043225c516a6ec8ce71772ca9232b8480f03a4960a79454cbab94f0061577458
-
Filesize
1.0MB
MD590d7321d217817dd9a84de0652e94178
SHA1ea4f08a9cfcef401091eb396a10b1684de1b530d
SHA25670e8164cc99a022ebc2dd8ab2d132672beb974ea583ee7825e274d43c505c26a
SHA5126dc7783ac230d16aad344a5ba508c6d818685d271b9d13321ee0b1607340d30d55c9392f5f1765908d6368b685ca3ab0b0a73a1c217e3ead0111049408f8f254
-
Filesize
774KB
MD59b80ca3f9289e80e1af13b0ab1910584
SHA19d0500bfd2e930ef43abcad01021f50f5568cca9
SHA2563670134ebbe3ac11b4ed83954df642e8a7b6f0c105f177c4d8f66f85489367e5
SHA512e1588e7e00ac2e17e56da9e9ab25f6355429a21dda40b4d83a53145c7b292e029ebd8fd37b232571238be3b9574ad08cd3bf84a2a5afe80b4d78fde85684699f
-
Filesize
464KB
MD5620fa63a7341c45c685275d914221ccc
SHA18e2ae9beedb0c5466a5b03b00052eccd21833a46
SHA256ae01d1a9a928600d810e94d977d644f12c4e1a84d7c7dab7da4afb6f451d8667
SHA512533a98504b16f49abd43913d91bbf44adf7b512058949b468d8b3058a1edd41da4e2989777a13677d26a61a2cd91f36ab9fce703c7a283f86985fbf9964b8dc1
-
Filesize
440KB
MD5aa1abbd863daecae1c6c1a427bd21777
SHA1495c56b2025caee9bf9baf98cae1c719f90c02a5
SHA25690f59563d069b956e528e6bd2125ba03f83d67d012b7be81124facbf8bded597
SHA512ad2ffac5f8919254c8ba2a64d9653899e3ae829f56c2ff80a3187b65f8d1cdd5eb06da4937c84889733063f443e0b42870d9f7b65ce52c18a0654de459fd4af2
-
Filesize
439KB
MD5c76464120f660568c6069bc04cfceb3e
SHA15c4df8cc5130d4d349a9b7b8f7c4772bbf990d3b
SHA256921e5fc3cd804c8657fa01e77fe747ae4ca213b40d6c1a175dbb57173653de3d
SHA512f0ee9967aee1c572d6115c862148e5205ce682009201c8f89ec93f7c13e1bbac8afbe54fa8a185911f9bc28c47a25590275d215a59fda5f3010f43f5d1b5faad
-
Filesize
878KB
MD5fb6edf537e1fb3e7141dfd0edc1a6adf
SHA12630061de937f9db70ad74574fa9e60725764c85
SHA2563e3c2c27add5c023410eebf9b2d4b7ef224b9e6a3bb05b6e63270de9ddd3e38a
SHA512efebb76d86bfeeed7076bbf4e38fa6b1aa783eca8e60d54d7b2bd9dc94b3bd3a7010f432d2eed8ad54f0812d974b2c492e25ec1e68cc36c212df41507ef4e7ec
-
Filesize
439KB
MD5e4786ea877266f0be1f4573d338511e7
SHA118442019864315a5354979c7e8cbbc4bf77c9360
SHA256145510a70ad7f02d6777ab5c074276820b4258a9ae03f4a641d521eb1414e6e8
SHA51270c708e7f4d4793398c44f422922f80715c3470339315f34bd404780fa911ec862003a554e427a50975bac651f1a8b844b2ce813d1cedcd7c5b597cd12e2f9ca
-
Filesize
437KB
MD5cf6805dfc441b9d87ca332a82ea695cc
SHA1d32b6229d0646319f26097c71fb0e66dcdd5873a
SHA256525f927dc954936beb5777f20eb30e52c3da2342abc8897b26545e96b46039ee
SHA5120801eb8b429b1c85a8deb503c25e63ba0c445f66363fbf73e324f35d15cd196dff1351a0d756894ab59b115220afb041a4dfa07870ee223bf7856d90cf07783a
-
Filesize
684KB
MD5caa409c9fa864af6c09982c39a08101f
SHA14a115346176c0622e3f49e9d186d04c7de91cc43
SHA2568c66bf1dac7e2248369131bcdbdab6f0407d20e21a57d9e2c71f873aca116b74
SHA51288149f476996a3e2896ec3312f78a56627b707ba6d595ea16836a5edfa6a05ca718c3435c7e11b60938b204729222f20845856bb211193340e9d3422b2fd8743
-
Filesize
824KB
MD5478230d65cb350ebde0dc66b76ac301c
SHA1ec2073fef4cbdfd3e4fd56afba7ec932364668a8
SHA2565c0bca7d26d341a0c5914b8c012be6de9db576d556feaeac2aa365248807c173
SHA51270a642375a7518d726253475f54029f858e61803d95eba32dfade9146b3e3d50f7e4d422c1df0ba99e2afe5d5545aca48f0958b66c88e528ea6f4a8d304da181
-
Filesize
445KB
MD51b1a2083f092de8caab5717eeb4c774d
SHA1dbff86ea41a7a86bad4c26c078751fd6c59764b9
SHA2563cb3b3f1ceb184a6b3a6d8bb100be0cd0821d4c320a942f0f1e679270bb3c75e
SHA51245ce2d0b77e5ca48805663e794e87cc161216579896726dfe54ce0ffa7d163b151f57d76ceac147b50e3754336d694854498440516849a1f693457650125bbdb
-
Filesize
1019KB
MD5cbee4a1954574364099062917a38d2f7
SHA12a788c4e120f46b9ab83c306ba91dd1fa9f4c454
SHA2560b61dc122efed95140f03a12f2dae6de034ba412d09709df57e0b655048558da
SHA512d269f2df22e04a89486989739035aae690c34fadddd199ad46e199b63e7bd88de56636179762a45e02191c1e5e0a50802bc9b6099d52af75e9bdcb8ffa0f0988
-
Filesize
444KB
MD50db39abffb6e5bdff382a9976f39fcdd
SHA106c020122d3fd154820479b9adf9f4886a9025ff
SHA2568c2490264a32952ac4ffe94fa118298dbae50e5c061bb372aa4c2bee9f1a13e7
SHA512a8c2109073800f9adb5afe295ec05ddf2dcaa2631b5e5ba7cdb0bbadf9a32040b61b0c0ff2bb192253561a0c94a7ccce9125cf5e55ea2f4f35ea0c3daf344afc
-
Filesize
439KB
MD59066a4010b0880681a4dacb45dd0b93d
SHA1d25c0990c6867017a04bd69f1cdc28a775826779
SHA256d0b24bef319259bdce2f6e9faf543a470a09b6d6f5119fd379849e94733d34dd
SHA5128159f8a059487549d18844fd49ee373e1d742d5ea5b4e95ce2e20d16c8f793023e97654bbc184b501dd09f82a162c52e47f419821ec9048b8f5b5aa4c57188ce
-
Filesize
4KB
MD5f31b7f660ecbc5e170657187cedd7942
SHA142f5efe966968c2b1f92fadd7c85863956014fb4
SHA256684e75b6fdb9a7203e03c630a66a3710ace32aa78581311ba38e3f26737feae6
SHA51262787378cea556d2f13cd567ae8407a596139943af4405e8def302d62f64e19edb258dce44429162ac78b7cfc2260915c93ff6b114b0f910d8d64bf61bdd0462
-
Filesize
720KB
MD5559911438ac38c9509d471b98ec0507c
SHA1deed544fa7c7e79696f7b6e9cd32d965ba92a3a5
SHA25607e91ad838c93787a1c225f135c96cc3c0eff34516ec0331a23ae650960169a7
SHA512635025f5b1656a4e476f5a35dfc68c8b938b7cc12b2f2ee2f44cea8ee74cd75fb6f1936d03624f16cfaf93f129e8e82e5e005425c53027ce88ed947d228028b4
-
Filesize
885KB
MD51dfb814cbb3eb5edd070d4efbbaa2c2a
SHA107cd850bd2a0224fc813d083abcea2b02770e5ce
SHA25620b9db3450c9bf79cfbee878f03b9668cc7506bc2b70c395a067c35cd32cea0a
SHA5120ab28b1c9b6e2bb8824b0a2e3d40d803ea1026dcec4af6d7e99032cf7172f9be5a1b6c4a7d28e84c67726a9fe66cac83e3d49657fc1bb780bb0d87fab4198c31
-
Filesize
561KB
MD5d843f1f2ddff2a5f19326d9b155303fe
SHA1d64997b20da5b6b46100f273c7d97bba16e082d1
SHA256e2df418f8ee3107c57d60fe737a83e9ec518fd392cee2b9282d0be22143ca2eb
SHA512de530d60480532bfca38a6b77e4ce4b78f8c99d61ebc85af1e88f067750b7994426bb6368f9d8fba03a44d110733049a162681b12d7b6c549e7b79a4b70a0922
-
Filesize
447KB
MD5aa8f3cabe5d260b9c712434b30fa69e8
SHA1030c705e71327a54143cf6cd19be4b3e3fde8bfb
SHA256fd1cf8eaa32c87b9d73eb874a93c2a3ef2c6b4251fe9293a70aabd4071f049ae
SHA5126535bcd2d71c9a271516fcb81f02653749035b1ed2c9a2e7578e005523ecc6c9d4b154feb3798c1d8b86e3e77f6531802cf1421490a0bc30a70bf9b101859b3f
-
Filesize
444KB
MD594dd1592a5660859d5adb879f8dd4499
SHA14a394da6bffacfdd2cafe07a01ec1468ba4ba740
SHA256e9f8da85ff487b9a03e5d3bb3d11993e8bb6c1ad9230fdc53f9482009f602948
SHA512f157dc63b08dcf1fc409443368b4af7d3f7087ee709e8fad28c71d721bd723d6278d25c141e8164a94d5615d29d45915230038949a9e5d46fb79579966e9c4f2
-
Filesize
434KB
MD52efe7898feadb1f41a3660139b98684a
SHA1392a5e236c7180a16d6faf2c523c18b9453803fe
SHA256398e9c5227c8a108c7b3fbe99caecf4af71266078bba44774b7b3dd050cf17a1
SHA5128ddcb9c2ff456de929c35a2576851f07859698786b8a59c754d85f3913af7b2ef3786f35b6d29090b33c6003dc54842a9602f5605fd46496f56595ca8128800d
-
Filesize
440KB
MD583b08c318c81b1bfa3d20e542c24ec40
SHA1b143f02df236dce41046ddcc94dd088ac5490595
SHA2567511a93a097e807f48a6a2b7b89a39a53797f45601013f3bd28c3615af16462f
SHA512cc04f80423633e3770aa02ac51f06857ec9b9b1625e097fbeab0b691430e372023600de23568efb1837ac49ff0ebeee2b2738d53db0ba8076e9294729824cf08
-
Filesize
631KB
MD5efef85b10d1c95105724f40949d81e71
SHA1fbead27adb8e674b2c939f7e87232edf2c3c8bd3
SHA25618878547976adb595806c023e0b38ee406d7535535b15dd2d6b76034557e4a14
SHA512aa67c1c097d5673ec2b98c9410ff8bcd222f6fc152960f2ec41592a31929d149132fdadff24e56fe04ec79088c539223be83d0215461fa9d6b9ac86f9658e4b6
-
Filesize
472KB
MD5a55838eca22229bf3f71603a7968b76b
SHA1bc7a582b2c51de543f277aacd3d1504a446090fc
SHA256f53dda4b9a05865f2fe2de41389f5f07a6d00d6d5d79c68e7d2ee4118f942e8e
SHA5125e4a3597b68ca9fe0b98cc784b32b3f6cffc071fb695daf076271be2e425c5a330029b7d5bfd850298ed212b094871712875a62daa3eb8b1d78f1baf5f0073c3
-
Filesize
437KB
MD51b106dcbf9acc7b520a24d7b15bf2782
SHA17a4c1bf9accaf5e35deed0feddc578864f9b92a5
SHA25608cbf4a29f4180e3dc773cf2f851d69f7a9e78ecdb5b2e9478e770431f5b353b
SHA512d8f8297785c398547b80badd3d609d1b1003aaaee74d9bbb5e90a04a7f6a10cfb734c32b417e16773957d7db8d3e71bd589707ca98d6ecf4756557501b543892
-
Filesize
600KB
MD5c25382c4510f6b75997455dc8b41903e
SHA1aed1b2c929c2fc927747e3dc0439436bc4c33fbb
SHA256527ecf4477dbe00f25da6774af5b68703ee134f1cf4cab1cd7c6087ea02a3aae
SHA5120f4fa479d94cf3b104035999f888331d556d503f64b4dfcacd4cbdb5604f2232c57d34c9b9dba25e4be380ca41f3cd0a5db97856a8ae5e3e8bce54a6cf5748b6
-
Filesize
3.8MB
MD5bd4d4d4a67d4791858c31eb507693ec8
SHA183515371481593f98a58242a749426c637ebe944
SHA2562ea94e4d70e67e6cb30661d75211d42f10c75c31678cd81ba9c934d13593679e
SHA5125e1ad62db1a8c7aa676be5e11c1c7f1c746e4f02e8ee61cea3911490bac3fe2922a3d04fbf745eac0bfbae38bc7e81f84a1c8762bb5502572af2ece17467ee9f
-
Filesize
438KB
MD5a65dbd4bea778dfe5479a27d80bfe748
SHA106e8e97eaa06d93974ee5cf5e3d7413a74150fcd
SHA2563cfe26df52c34e49fdecc477304d421dccbc8bedcf04c54ae5873d64638d8853
SHA512c3a77a1457af388b27b50792710e4977851aeb2d75425fab041401713619a267ad8009cf39878301df3639959d8a79cb0171b459ff5be04aa0ddca6409bab420
-
Filesize
437KB
MD5bd0ae11038e64a470df274ff5e49bc2c
SHA1aed309b686ca775365a0cda2957de82b8dd67438
SHA256dd1d04d9cb395a766e287faddeeec9c0e7d6ec05b18741202ff770c02a46ca6c
SHA512c3457d71de07fae17b790ae5c6a90c7e332b3235c65088a2c9390c24e5bdb7f5a1645bcaa76295838220a2ad8796e68b039b0b2087a0a650559d3d10a8312bdb
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
441KB
MD50f90b638990c40b5a268084d6c0cf1a4
SHA15dc6a72904acab7445024f3aaea4f62a7747faec
SHA256a3068a86b904c9ed322331cfa1824e96a9de8f6e911787a328ae2c1e2bea987c
SHA512e1d1ebc165105f1f543e6d29f2c33b81e5c497e09b1d1476b214ddc8342f498202aa1bae1c890db220c904a2547f47a23b8efcc57ce3aa1b24531c966421fc7f
-
Filesize
442KB
MD532a0e125a92361807555baa2810dbcb8
SHA12a6597499cdd5ea05f7ab7fae3737350339a1be7
SHA2568846db0e01e3305cc10f7e79403858f9b5c0a494898d1ced5910c35c72d7eda3
SHA51257ba8b66af5d567d46cbb1236f0dddb3ec04cc35ed5d61bd6c58f63b5703c84f97e9437d31a6ba98b2d32bd815381ae5b269f3044eedcd79cfb9a620edc6b798
-
Filesize
443KB
MD51c261e409df6aaaf5c8406491b33609d
SHA1c26b84c98360d803bb09c08d6557bbf434715acc
SHA25633cb9b62c1db991743d46f53be0fa1c646cf53ac9eccd939a6cedf7d48fb644c
SHA5129513e7eba22fab52faf76f5d1aa8008f77d54c05a5ce2b325cf54185668aade9a220cce6df6c2bb9a433c3634dd960ba4cfc0e6b66cd31a64cb97da6d988ce9d
-
Filesize
4KB
MD5ee421bd295eb1a0d8c54f8586ccb18fa
SHA1bc06850f3112289fce374241f7e9aff0a70ecb2f
SHA25657e72b9591e318a17feb74efa1262e9222814ad872437094734295700f669563
SHA512dfd36dff3742f39858e4a3e781e756f6d8480caa33b715ad1a8293f6ef436cdc84c3d26428230cdac8651c1ee7947b0e5bb3ac1e32c0b7bbb2bfed81375b5897
-
Filesize
447KB
MD57443824d3ecf1e45ad4936ff07fdc3c5
SHA1d35192575284dfe9feab3dbff09e353c14a2a306
SHA2561db416abb829da60f708ea61556ad3ab41336209a0011af845fd2b57f91a2cf7
SHA5120e8046756f1204d3b9ef44ebef4b3fb485b08da8a86e277c71a42c54f02efec421d2225aa6fdee135e32d095638b518f786db34bf0accdfb91fc29aee7f7f932
-
Filesize
438KB
MD5238f68ba8d9fa8461e3c29573fd367b6
SHA1f6f4eafbfdddd1c11d6c213e3ac2c0d9922663df
SHA25682dce6b8d7d754f526b29f3bcccf1d52ff9288b34f2b0e50b2bc184f13c33eb6
SHA5127c10c226e80e0a601d822ad8f6ccb7b9b413b7765193458c3bc962ddf822e7da56060eb3398c490eed667879018175bba7946f3befa0531db602bf311999d4d6
-
Filesize
435KB
MD5a1ab69591bc85315d7ee20ab217b3e85
SHA15eea832146e51a4b5d62ad85503fdd1c7d9266fc
SHA25670e78d1baf4bd3768a04c7f609d1e1543135978e9631a813f707d1ffc56575ec
SHA512e711dda1e70747f61d61d1f109729eb9da0b2e8c20ece2ecc16f9a94a6db2169bccbff5f3e4c72e366b12018e97718e415750025bfb7b6faff2004e0d62bb8a4
-
Filesize
436KB
MD50b5d671e3a3158de567ddaee4fba0fb3
SHA10e1d21ee5d4c2497b3d25a1549e58602856b7878
SHA2568015f8d95f3f319ee518896fa20a075ba7a469f9b4a3417390f0020699243794
SHA512063e5dfefb93f7efc802f366158165dfb286f8038fe1ebe77bb2a125bdd659344fde1c127dc743acaf5c1dcdec18335b21f9cbc90dc5d65c8cb8be6f740e8492
-
Filesize
454KB
MD5b72a99dc6db83ca238fac37385d8cf53
SHA141ca591f9d73cbb692a442a7e582198e075cb660
SHA256ac7708e3a40b86346ff227ef724d1a426070d10fbecf18fa253582e3613a9f36
SHA5121b4acfbb6fcc3a81d8139a3fd38db6cf72c3305b99b0975830cd26f257f391bac70cec205bc4e62a5acaee8993dacec2d1672916596e6223e4c6aca52f844c4d
-
Filesize
1.9MB
MD5e4ecb6daac659412905eedf37c9f85dd
SHA18f653503a2339b083bbde9959d3fb6290c3f3d77
SHA256fdfed4ab797b8f51f78595be4f1ced1bce24073be17dc1aa4687469adc53a516
SHA512d7c8b8e969876829e082d313357da4d18e4dc4d8611d79ae84b615b285b034aaa2f3177be0aa1dcb3adcefe8c6a423f15a5357da73c4122dc84b81307e51e431
-
Filesize
4KB
MD5ac4b56cc5c5e71c3bb226181418fd891
SHA1e62149df7a7d31a7777cae68822e4d0eaba2199d
SHA256701a17a9ee5c9340bae4f0810f103d1f0ca5c03141e0da826139d5b7397a6fb3
SHA512a8136ef9245c8a03a155d831ed9b9d5b126f160cdf3da3214850305d726d5d511145e0c83b817ca1ac7b10abccb47729624867d48fede0c46da06f4ac50cf998
-
Filesize
442KB
MD501a0c36078492c7b2130c671567c377f
SHA1d9c3b4e05676480c53a24b28b8e819c9048bd603
SHA25614bb93ad44bc1f26916e954a40b4994267dc286f3adcb3bbb4d9175936e44b9a
SHA512032ee878ab1f2b53183252a3a26365895f2b9c9a60c68be3e5be06c2c099979f6ff9ae241308633c2cf4d7dc978bb442c30de2f55077d80444126d29082b8fd2
-
Filesize
1.0MB
MD5e54dd0c0397a4e953103704c1be1e8b6
SHA1699de4b9b6bbf0bd61a01fbd8ad42bffe6367f85
SHA256e2e0ca317b79abe60fbf46578b9739dd8ce76cc89be714751c51c86c8fe3e619
SHA51238a170d5a100151f58ec50812c069dcc1bb69a79313f083f10f5bfab17db17848d57f702050cdca447c93f28ae0f6c2d65d6f4e6679a5cda1af718f810ed7df8
-
Filesize
438KB
MD5b745be3311120369bfacd5fe6ba70c51
SHA11880a4f0d648e9e907dbf2158a5f6b54f9f2c347
SHA256ba862c48f474be975250ed5324fb3fa3eb681b0974b5e2a5b5112bdc0d150754
SHA512ba54028e1e511ed50ebcfbfb29bad961ee688bce758bfbf2dc1abebb3cd8fb8b82f30a0aaca3d2a79acd48e77bb77d65f580b01c28e9ffe5f93b015930353520
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
440KB
MD589e44c99305d930e9668071e851274ad
SHA17f95cb81622e6b494b1a799c0d337809576df5b4
SHA2568084f4ff97636ee708d44a30f07a5b94ac2f5454e580fd2093d827a68f2ab592
SHA51221c7a00d7e4c2f151618aa687b92f7c031aaf5264d1c3df9e47881b5c2943cc4cfc53fd5cb7bf6a58725bd9f9e5424e298155d11f1a0984379c77cb030c183b4
-
Filesize
671KB
MD5de751ab909d7a5bdd134b3bd98f77bec
SHA150e86bf16b0cf96dc7c1d58b3ee6cb87f43ab663
SHA256396981b2938bcc685643d30cbee6ebfdb1feb03a01704b51fd00771c08b52e82
SHA512c0544d0ad3da46b5b7a84d755045acbdc45ee58747c306dc1e7d47626005406a179e5eccb632fa73d341cf0021b361e5ab6f7052865eca3806addeab32704f31
-
Filesize
462KB
MD5bbc55479a48b634b4539690ed46b1da8
SHA1a247f1e08b7a622ccdf8c236957e96c0993f08d0
SHA25691241b0645b21704595970f7435083b74b3c03ba44750a6a7415b4a1db217320
SHA5120719c857e607ec735ecf5df1b302a6955aab4d09083b06e705ad4c6625d47f81a104069cbe86f40d12d2ea604ec665477c0ff10872eb664440d478ebab0affc1
-
Filesize
1.0MB
MD5aaedf87b3e862223074bbf5b65ccc914
SHA16f722658163b70a3af00047e12e1fa7ff5f0b434
SHA256d8bf19618f605ba039ceae2ec1e52af316475bc5c8fdc466aaea7a3849f15348
SHA5127060120305c9bfac5254ed8797032a437961271c9fa52d7bd5e635fbed3e1c9e7094eb7c2c0d35699e40e7f7741b2d9dc16081d45c1fc98143fa84b9d3c03e2b
-
Filesize
439KB
MD54dbb222d653d2e26907fee2983ec9961
SHA15bb610520a5089e823de72d511888020f6629d00
SHA256c4a421c7dd55c5b36f66662347e66d33e75baacf666da55729812ae0d28569a2
SHA512b1d0c32a17edcfc296c2ae429f50a005f019866b23acced2f29b5d549810e29fee92ff1b3f218920f583cd49cb8d6aefebc47051a6abff4b5b32b381a44c3dae
-
Filesize
887KB
MD5c59a36f88b2f9ad357f7547b39d26c1a
SHA1bf0d523cbf0d928ab5f7a8d561dc5b12d5acc959
SHA25662f9c6020c9b9e96ba24c6462203bdaa20304f1ddef90ef15e0b205f840dd7a5
SHA51225ed3056163da46f1bb6f8eaca7f9db222d52aa5d4cc2095d78b694ee9a232efde8456d1ceca46f38942b9bf3968e181d44e0dcab2a3680fd6cd505d4b921521
-
Filesize
855KB
MD5501cda97b4d3d2da1c5755b09bfe48ec
SHA1768d4d446c6492303e94dcdaa618ad204fef31b0
SHA2564ed8982905ee4c7a08835cad467ad3b4b5c04c4eab01188d50858797b958e60a
SHA5128558323da8408c6ebfe4c554f3da362cbab1aaf478a16657e64ff17fc4f52b791f188efa588fa375d3add6e5c8f9ded60d34bba284e2ef3cc73f4f6ad616d543
-
Filesize
561KB
MD502296402ba0281fabf07c58fd8abf3d0
SHA13bd476a7241b58337f5c2079b66992553d57bb3d
SHA25615c9e0b7bef30559c6c929ab73e35c92aec9576458c05dd87944767bb90034a0
SHA5126fa8be6e2ec07a3b7b7f4fcf8e9a1510f534b59bbce83d7cf7069c5e143597a802a8aafd3012eb429a4301ceef2e92b4e29d2c2ec07903282b1f2321fb79feab
-
Filesize
433KB
MD503e22445882f7a509f0bd1842655d0c7
SHA1b4178976eb2a06780e57f0392df8f430ef84c4de
SHA2562db35e5fe6b3799d2e1fe7bbe5c1d72c62aafc60ba735f3d3392eaa306257c5b
SHA5128e93a72b0402c5cd20e55b662985fca879c1d6b78b26ac333b0e7c2ce16f58dc34cc8afc13d815a1069c3c5ae3c9e29ed291a05a6845ca517c55ebc1413cd81e
-
Filesize
735KB
MD56fbd26883b87b56f7a9730266ebc1a68
SHA1b0211d81745a4e45f6dcc7c45a4c7786700aecf5
SHA25614ff2a30b31b50727900ab2ca80642a1546c1cbad5f01e679fc3574f7b196e05
SHA51246629ee34ed8e33bbcbe7f4bcf55e0396bcfe64501161220c947088f3e3b7d739bcbcfcde5611f9ee32db1d942b8165089c8b7e4606ace80a696136073b888ae
-
Filesize
438KB
MD52bd5f5c61367311201c01fb6dab8bdd9
SHA117a627d4474db7fae03b27d7305a3b911f37b96a
SHA2562b712d1a3e2196d8a9768c9f5bccbee12b628c5f7881b6d4bb5238f7de4ef4c8
SHA512e013b3c1abec178c80b17873ccca71ce3bcae0ae169f63d22fc9a384dea65fc281e7de4b2af3722a9f1c335eb719c5648f4b58dbd9ce696ba6f7ee6eb1d22200
-
Filesize
442KB
MD5036327f963c5a44269c4a91b8f5cf9b1
SHA17e0cfae9c12a000d0705eaad66f2bdf84852b186
SHA256ca54960d000460eb4eec09e47d52b60a4a8dd98573aeed905964ce7311fc5f50
SHA512dcfd5cea3259ba6ca38ac28457a0f60562bb0168c195db56939459efc4ed3733c1cd9123be58c58663d40f79eb04768d981b5f83900490880bcbc79ec6cd8b34
-
Filesize
808KB
MD5caea203132fd8be3f1aeed40886216bc
SHA1bc42d5321fa143e691c738df600ce2bcdbec397f
SHA256d3f10d860ff365de31906a5a63fd72423b4f8a4ac5cde2fdb73ca407b0ceb566
SHA5125db234f5f169d5b98c642dbfb1a818e8ab4bcefe42bdbde045fade29e1edbb102d7b7382813236b46dc5f1a6de1ee2cb4db655fc2012a2065778bacc809771bc
-
Filesize
442KB
MD503f9348fb8e37385b7ff5af206ab485c
SHA1c427366013d76fd332305713f7c0c52a2074f1dc
SHA256f3df6bddff04f4a535f73ffdd49fea76c5686fb1a5a4d06715cbe537255948b1
SHA512540f23195b9a2cccf38f47324e284da4629120ffd56fbc286600b58049c1fca00398af1bbea360d05fdebc16832c5b1ff25b52e6a8e5e8b6413b843f12cfdc2c
-
Filesize
437KB
MD51b034b30cda052e7773817ba17e66b27
SHA1223a6e318ada500df1fd031380a4bb6f2ad2c5f1
SHA2569a11e52970d538a92647902b8b090a00c1cf1bd519fcc8b0a7405857cbfbf872
SHA51217c90be7008ff67cce3c5b1ae4cfa9d7c3d86f223845d398c22775c4d45e3f4fed3ba1f8b2528eeec091f44ff59a9a67bb2ae526c65ff54ed77c4ce9c4fa131b
-
Filesize
437KB
MD5ccc78f3e89ed0349fe10ce994662e911
SHA1cde35779451421204e5716d99f89f3b59fbdceb0
SHA25640199fb2897c142a3c0154fb45b4fb4e2a453b3cd3a6552e55fe9fa697e04e92
SHA51228699cb6f3d2b0a0c7ad14688dfecf3d708c3dfbfa190d8d10dba079a251452e12d0cdfda749905dd88cef36c0020a47498c93911747787fe6440d1a41a5f947
-
Filesize
861KB
MD501408e3eca0ad985e74279576091c8ee
SHA1f064330323dd48b389e9a4ebbfb8ccb243809f8e
SHA256c8de01d6dc77861133fc766efcc1d90ef92652bd1ffc5e94c3423c402a456893
SHA5125b82668dc09e99a49ad583be6ba69a5edfc73e2c59f4663550390bd79b93278454fa70aa1a6374ff7e05d0d0bb050bf99c9d2103eef023ff7c03d91edd5472cd
-
Filesize
433KB
MD59e93a1b44bb03591c3f3ea5d59664ebe
SHA1ab80c665f6f1e331eb0fff7d1ee181be82a0e05e
SHA256dffdc679ffb2a3595b57c9bfe5a1a463fd0e98670b47b1b4b15e59971631849d
SHA512d316bdc0622acd0aefce2cd5f4cbc9bd2aa140f5fd3c9062516d9f57f9e72447a68a9808a859722e88903aca228b0eaeb885acafd72163e7f7b166a588eb778b
-
Filesize
479KB
MD5c5149fedddaf801e3992a9925d4c54b6
SHA11a9dec12745a9b4528b4885bf33b315ae9b5374e
SHA2561a8b82caa8158334156377f2661b040a762ee8a7517920f9e75c34b61a7cc6b4
SHA512dd58c02b5851ed62a5e802ba6ad79d0708e96931e7c7babf8c6934250190eb827e3d59fd0dfe9f837a5861061a03ede3bb3be60f88417d09735dab4e6576f172
-
Filesize
2.0MB
MD54d3db94db2dc478728d689a87eb55c3a
SHA1b3af0026dde0612436912a9804aac6be945dadc4
SHA256c59d4be1032ad8471bb33ec446abc421b857ff166950826de2dbfb93e472785a
SHA5127d5e0a8b85514d26793e548bbfa15dea4d98efa0c03725661b737c55e150307d9dfa8d6b1b0570cd5e4ee187a231852f230ba93e539824f8c72abd2575d33c50
-
Filesize
883KB
MD52c1a90a803a91fed1f489c0fa6f2527c
SHA1b12733df1f9b0e3c5355d752236879fa457640a6
SHA256d3e0492638350eb1e7484e6f356505aebf2ff12ec49d563179e741fd67b78d21
SHA51265675ac0d85298a9c0e4876961c45ea2de71d8cddcbeab70fa5f763200b32446b7622d6fa17e1514569c9cfe509ce49100c83875abaf968c00b83d6fc51e8649
-
Filesize
438KB
MD53cb198fbfada59b5aa2633e764acc579
SHA128bfc7549b8f9d9fb2cf52f8b07bb40d80e81e9a
SHA2567d6db4424be31d905fc6cf7c92a539eb213d5caeae8867586c78413e90029aa6
SHA5125336350bab405fbffac5aa47b5b1c6e6b24ff5843253a1e090ff5b1a2899e2e5d843d2cf67d5d628c76bd1a3fc6f857cdb8e6490dbfad38d80ebcc99b0c8b415
-
Filesize
4KB
MD56edd371bd7a23ec01c6a00d53f8723d1
SHA17b649ce267a19686d2d07a6c3ee2ca852a549ee6
SHA2560b945cd858463198a2319799f721202efb88f1b7273bc3726206f0bb272802f7
SHA51265ccc2a9bdb09cac3293ea8ef68a2e63b30af122d1e4953ee5dc0db7250e56bcca0eb2b78809dbdedef0884fbac51416fc5b9420cb5d02d4d199573e25c1e1f8
-
Filesize
438KB
MD53f51e70c2b6cfd4d369b2a33cb3f1232
SHA1ff0e24eb68ada8dd1befead96c98c6cd2eaa3b9f
SHA25689c3cf2bf14e2087a1bca4f13aba2b801c47f43f33614e610d0c14f2986c45d1
SHA5120e845a2740cf4cd8ffac3349aeb2727c225766c8e553a65a1ed3a0ac8d75ae89623a059b0644ba28ecfadea539a994655ed3342942346d4739cf29779f40aeda
-
Filesize
460KB
MD5132d767f674f7c0f15518c1630a65bd4
SHA10332d36a6627594cdbffbbb68cf6d9340f5d7ac3
SHA256def5520e3a5a7f4fe3d525118c63c42a587fbabe3e34781f2d8d830261c1e598
SHA51204559bf7a985ca2d16159ae21e67bd88ba4654d1ab17241589172488419c034d5ae0f2124b951ff7894f0c78078eba629e5ab4fc22ee5a91fbea6b0898fae05f
-
Filesize
430KB
MD52cd956fb121c90e47ead59c26e518afc
SHA11adbacb766f16af575f9aff399ac8fe1f949a9aa
SHA25610c7e8812835209f79f2594c56ffbb8734c23f13766da5939535315bf3749a08
SHA512f7f6b99629092dd9f0ebc9af02b4c5fde03131c4f16bc941702626d8efe5c3f017b9778d270bbf59a367ef1c881034ccaf542ddafa86757228a50dd7a522c8d7