Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe
Resource
win10v2004-20220812-en
General
-
Target
e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe
-
Size
442KB
-
MD5
580b78989e9840d5fc491ca4f58de970
-
SHA1
9d6dbef5a4a96729b0a7d392d4a548527f351ec7
-
SHA256
e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30
-
SHA512
e4eafc0b57b67817bc5dfb837f078b0e79f1ce2c7c9823058da62d67858113bbffd322fef4afb8acb5a4e7bfa7b98818595558699903872cedbc3bb84af7d962
-
SSDEEP
12288:dfS5eR1fgPd7OXfV/E0ZP+PAN6DP2+zp/b:1oUsd7Ot/HG4K2+FT
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4432 uqIkUUcs.exe 3520 XMwEQcIw.exe 1480 KgEsEwQs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation uqIkUUcs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uqIkUUcs.exe = "C:\\Users\\Admin\\SSkskUEU\\uqIkUUcs.exe" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XMwEQcIw.exe = "C:\\ProgramData\\AGQoYsUM\\XMwEQcIw.exe" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uqIkUUcs.exe = "C:\\Users\\Admin\\SSkskUEU\\uqIkUUcs.exe" uqIkUUcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XMwEQcIw.exe = "C:\\ProgramData\\AGQoYsUM\\XMwEQcIw.exe" XMwEQcIw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XMwEQcIw.exe = "C:\\ProgramData\\AGQoYsUM\\XMwEQcIw.exe" KgEsEwQs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\SSkskUEU KgEsEwQs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SSkskUEU\uqIkUUcs KgEsEwQs.exe File created C:\Windows\SysWOW64\shell32.dll.exe uqIkUUcs.exe File opened for modification C:\Windows\SysWOW64\sheResetFormat.bmp uqIkUUcs.exe File opened for modification C:\Windows\SysWOW64\sheWatchClear.docx uqIkUUcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 5068 reg.exe 3456 reg.exe 4308 reg.exe 728 reg.exe 2036 reg.exe 448 reg.exe 4620 reg.exe 4124 reg.exe 228 reg.exe 4724 reg.exe 4444 reg.exe 4736 reg.exe 2688 reg.exe 4784 reg.exe 2804 reg.exe 5036 reg.exe 4900 reg.exe 1784 reg.exe 1876 reg.exe 5112 reg.exe 4880 reg.exe 4712 reg.exe 3528 reg.exe 2036 reg.exe 2992 reg.exe 3824 reg.exe 4224 reg.exe 736 reg.exe 2640 reg.exe 4088 reg.exe 1000 reg.exe 3112 reg.exe 1484 reg.exe 2024 reg.exe 3396 reg.exe 4388 reg.exe 3652 reg.exe 4212 reg.exe 4640 reg.exe 1580 reg.exe 1732 reg.exe 3312 reg.exe 1592 reg.exe 616 reg.exe 1100 reg.exe 3144 reg.exe 1312 reg.exe 3088 reg.exe 2764 reg.exe 3316 reg.exe 4320 reg.exe 3088 reg.exe 632 reg.exe 1504 reg.exe 3804 reg.exe 368 reg.exe 5100 reg.exe 1504 reg.exe 4048 reg.exe 2120 reg.exe 2464 reg.exe 1784 reg.exe 1632 reg.exe 4704 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 1236 Conhost.exe 1236 Conhost.exe 1236 Conhost.exe 1236 Conhost.exe 4800 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 4800 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 4800 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 4800 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 724 Conhost.exe 724 Conhost.exe 724 Conhost.exe 724 Conhost.exe 3900 cscript.exe 3900 cscript.exe 3900 cscript.exe 3900 cscript.exe 2576 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2576 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2576 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2576 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2712 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2712 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2712 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 2712 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 4388 cmd.exe 4388 cmd.exe 4388 cmd.exe 4388 cmd.exe 3356 cmd.exe 3356 cmd.exe 3356 cmd.exe 3356 cmd.exe 2352 Conhost.exe 2352 Conhost.exe 2352 Conhost.exe 2352 Conhost.exe 1128 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 1128 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 1128 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 1128 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 4876 Conhost.exe 4876 Conhost.exe 4876 Conhost.exe 4876 Conhost.exe 2576 reg.exe 2576 reg.exe 2576 reg.exe 2576 reg.exe 1096 cscript.exe 1096 cscript.exe 1096 cscript.exe 1096 cscript.exe 3408 Conhost.exe 3408 Conhost.exe 3408 Conhost.exe 3408 Conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4432 uqIkUUcs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe 4432 uqIkUUcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4432 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 82 PID 2072 wrote to memory of 4432 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 82 PID 2072 wrote to memory of 4432 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 82 PID 2072 wrote to memory of 3520 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 83 PID 2072 wrote to memory of 3520 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 83 PID 2072 wrote to memory of 3520 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 83 PID 2072 wrote to memory of 892 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 85 PID 2072 wrote to memory of 892 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 85 PID 2072 wrote to memory of 892 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 85 PID 2072 wrote to memory of 1928 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 87 PID 2072 wrote to memory of 1928 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 87 PID 2072 wrote to memory of 1928 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 87 PID 2072 wrote to memory of 4336 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 92 PID 2072 wrote to memory of 4336 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 92 PID 2072 wrote to memory of 4336 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 92 PID 2072 wrote to memory of 4876 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 224 PID 2072 wrote to memory of 4876 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 224 PID 2072 wrote to memory of 4876 2072 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 224 PID 892 wrote to memory of 3968 892 cmd.exe 93 PID 892 wrote to memory of 3968 892 cmd.exe 93 PID 892 wrote to memory of 3968 892 cmd.exe 93 PID 3968 wrote to memory of 2756 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 94 PID 3968 wrote to memory of 2756 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 94 PID 3968 wrote to memory of 2756 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 94 PID 3968 wrote to memory of 4828 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 96 PID 3968 wrote to memory of 4828 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 96 PID 3968 wrote to memory of 4828 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 96 PID 2756 wrote to memory of 1236 2756 cmd.exe 167 PID 2756 wrote to memory of 1236 2756 cmd.exe 167 PID 2756 wrote to memory of 1236 2756 cmd.exe 167 PID 3968 wrote to memory of 332 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 98 PID 3968 wrote to memory of 332 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 98 PID 3968 wrote to memory of 332 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 98 PID 3968 wrote to memory of 1708 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 100 PID 3968 wrote to memory of 1708 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 100 PID 3968 wrote to memory of 1708 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 100 PID 3968 wrote to memory of 5048 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 103 PID 3968 wrote to memory of 5048 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 103 PID 3968 wrote to memory of 5048 3968 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 103 PID 1236 wrote to memory of 2256 1236 Conhost.exe 104 PID 1236 wrote to memory of 2256 1236 Conhost.exe 104 PID 1236 wrote to memory of 2256 1236 Conhost.exe 104 PID 1236 wrote to memory of 228 1236 Conhost.exe 359 PID 1236 wrote to memory of 228 1236 Conhost.exe 359 PID 1236 wrote to memory of 228 1236 Conhost.exe 359 PID 1236 wrote to memory of 948 1236 Conhost.exe 115 PID 1236 wrote to memory of 948 1236 Conhost.exe 115 PID 1236 wrote to memory of 948 1236 Conhost.exe 115 PID 1236 wrote to memory of 1980 1236 Conhost.exe 272 PID 1236 wrote to memory of 1980 1236 Conhost.exe 272 PID 1236 wrote to memory of 1980 1236 Conhost.exe 272 PID 5048 wrote to memory of 4244 5048 cmd.exe 112 PID 5048 wrote to memory of 4244 5048 cmd.exe 112 PID 5048 wrote to memory of 4244 5048 cmd.exe 112 PID 1236 wrote to memory of 3772 1236 Conhost.exe 211 PID 1236 wrote to memory of 3772 1236 Conhost.exe 211 PID 1236 wrote to memory of 3772 1236 Conhost.exe 211 PID 2256 wrote to memory of 4800 2256 cmd.exe 113 PID 2256 wrote to memory of 4800 2256 cmd.exe 113 PID 2256 wrote to memory of 4800 2256 cmd.exe 113 PID 3772 wrote to memory of 4748 3772 reg.exe 273 PID 3772 wrote to memory of 4748 3772 reg.exe 273 PID 3772 wrote to memory of 4748 3772 reg.exe 273 PID 4800 wrote to memory of 1312 4800 e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe 480 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe"C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\SSkskUEU\uqIkUUcs.exe"C:\Users\Admin\SSkskUEU\uqIkUUcs.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4432
-
-
C:\ProgramData\AGQoYsUM\XMwEQcIw.exe"C:\ProgramData\AGQoYsUM\XMwEQcIw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d303⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"4⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d305⤵PID:1236
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:4828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:332
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:1708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IswEwMUo.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4244
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Modifies visibility of file extensions in Explorer
PID:4736
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1928
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4876
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kqgwIggQ.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""2⤵PID:3436
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3816
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1808
-
-
C:\ProgramData\fCsgAUAY\KgEsEwQs.exeC:\ProgramData\fCsgAUAY\KgEsEwQs.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d302⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"3⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d304⤵PID:724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"5⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d306⤵PID:3900
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:3396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nqsAgcMo.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""7⤵PID:3460
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:4876
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
- Modifies registry key
PID:1876
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"7⤵PID:2268
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵PID:4216
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵
- Modifies registry key
PID:5068
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DcMYoQkY.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""5⤵PID:1592
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:2120
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:3888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UgcwQcIE.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""3⤵PID:3036
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3168
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:4772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:5088
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ykcYUAcU.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""1⤵PID:3772
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:4748
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1980
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d301⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"2⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d303⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"4⤵PID:2336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d305⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"6⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d307⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"8⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d309⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"10⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3011⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"12⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3013⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"14⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3015⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"16⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3017⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"18⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3019⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"20⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3021⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"22⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3023⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"24⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3025⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DCwkEwco.bat" "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exe""26⤵PID:1380
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:1560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- Modifies registry key
PID:1100
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:4880
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
PID:4736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"26⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3027⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"28⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3029⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"30⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3031⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"32⤵PID:3416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3033⤵PID:3888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"34⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3035⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"36⤵PID:1400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵
- Modifies visibility of file extensions in Explorer
PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3037⤵PID:528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"38⤵
- Modifies visibility of file extensions in Explorer
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3039⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"40⤵PID:4876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵
- Modifies visibility of file extensions in Explorer
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3041⤵PID:1732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"42⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3043⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"44⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3045⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"46⤵PID:3052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵
- Modifies visibility of file extensions in Explorer
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3047⤵PID:4996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"48⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3049⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"50⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3051⤵PID:2856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"52⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3053⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"54⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3055⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"56⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3057⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"58⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3059⤵PID:1172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"60⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3061⤵PID:2304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"62⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3063⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"64⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3065⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"66⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3067⤵PID:676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"68⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3069⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"70⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3071⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"72⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3073⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"74⤵PID:3416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
- Modifies visibility of file extensions in Explorer
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3075⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"76⤵PID:1876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3077⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"78⤵PID:2688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3079⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"80⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3081⤵PID:3316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"82⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3083⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"84⤵PID:1784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3085⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"86⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3087⤵PID:1968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"88⤵
- Modifies visibility of file extensions in Explorer
PID:4192 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3089⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"90⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3091⤵PID:1840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"92⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3093⤵PID:1708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"94⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3095⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"96⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3097⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"98⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d3099⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"100⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30101⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"102⤵PID:3928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30103⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"104⤵PID:3464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
- Modifies visibility of file extensions in Explorer
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30105⤵PID:1936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"106⤵PID:3476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵
- UAC bypass
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30107⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"108⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30109⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"110⤵PID:2552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30111⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"112⤵PID:4792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30113⤵PID:3832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"114⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30115⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"116⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30117⤵PID:4600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"118⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30119⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"120⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30.exeC:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30121⤵PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e99228d25fcc0f53d50baa5f68af4eab9ffa113e1dba240822cad9f2e4dc6d30"122⤵PID:3164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-