Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 22:29
Static task
static1
Behavioral task
behavioral1
Sample
4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe
Resource
win10v2004-20220812-en
General
-
Target
4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe
-
Size
439KB
-
MD5
a0a94f9d75cdb129408381ff11a95640
-
SHA1
07c4d9ad5db1c6fa1e408653042132c95733e4cb
-
SHA256
4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1
-
SHA512
da63bd18bd70ae019b3dd6105920b670c849d73b40ca7971eb491b30df8fbf03c2b45868b8c9c79b44e58034948a64d7d6c67ba00e4aae8e4781de0041398262
-
SSDEEP
12288:xbFDBR0x9PTTJ8cDqgYpbcaivDgaTNL/3PLiQwfoD:/kx9vSaq7bcaogofPU4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4872 tsgYgwkI.exe 2028 OycIYwYw.exe 2232 fCEcgwkE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OycIYwYw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OycIYwYw.exe = "C:\\ProgramData\\KisMkgoI\\OycIYwYw.exe" fCEcgwkE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tsgYgwkI.exe = "C:\\Users\\Admin\\sawMUsUE\\tsgYgwkI.exe" 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OycIYwYw.exe = "C:\\ProgramData\\KisMkgoI\\OycIYwYw.exe" 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tsgYgwkI.exe = "C:\\Users\\Admin\\sawMUsUE\\tsgYgwkI.exe" tsgYgwkI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OycIYwYw.exe = "C:\\ProgramData\\KisMkgoI\\OycIYwYw.exe" OycIYwYw.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\sawMUsUE fCEcgwkE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\sawMUsUE\tsgYgwkI fCEcgwkE.exe File created C:\Windows\SysWOW64\shell32.dll.exe OycIYwYw.exe File opened for modification C:\Windows\SysWOW64\sheRegisterUnlock.jpeg OycIYwYw.exe File opened for modification C:\Windows\SysWOW64\sheUninstallCompare.doc OycIYwYw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1960 reg.exe 2872 reg.exe 2604 reg.exe 2240 reg.exe 3960 reg.exe 848 reg.exe 4712 reg.exe 4520 reg.exe 1572 reg.exe 1188 reg.exe 4968 reg.exe 4412 reg.exe 3500 reg.exe 2244 reg.exe 4868 reg.exe 4576 reg.exe 1980 reg.exe 4812 reg.exe 4432 reg.exe 4924 reg.exe 4656 reg.exe 4236 reg.exe 3312 reg.exe 2180 reg.exe 2056 reg.exe 5036 reg.exe 3860 reg.exe 1772 reg.exe 4512 reg.exe 4892 reg.exe 1516 reg.exe 3564 reg.exe 2952 reg.exe 3112 reg.exe 1116 reg.exe 2244 reg.exe 4764 reg.exe 3608 reg.exe 1188 reg.exe 1944 reg.exe 3088 reg.exe 828 reg.exe 3192 reg.exe 4500 reg.exe 1148 reg.exe 2544 reg.exe 4432 reg.exe 3504 reg.exe 1880 reg.exe 4324 reg.exe 1996 reg.exe 1140 reg.exe 4976 reg.exe 4892 reg.exe 3296 reg.exe 4060 reg.exe 1868 reg.exe 640 reg.exe 1200 reg.exe 3224 reg.exe 1304 reg.exe 3536 reg.exe 4844 reg.exe 4312 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 796 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 796 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 796 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 796 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1292 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1292 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1292 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1292 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1964 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1964 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1964 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1964 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1924 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1924 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1924 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 1924 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4100 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4100 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4100 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4100 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4064 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3464 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3464 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3464 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3464 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3148 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3148 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3148 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 3148 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4236 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4236 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4236 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4236 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4596 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4596 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4596 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 4596 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5108 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5108 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5108 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 5108 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2028 OycIYwYw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe 2028 OycIYwYw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4872 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 80 PID 4804 wrote to memory of 4872 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 80 PID 4804 wrote to memory of 4872 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 80 PID 4804 wrote to memory of 2028 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 81 PID 4804 wrote to memory of 2028 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 81 PID 4804 wrote to memory of 2028 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 81 PID 4804 wrote to memory of 2984 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 83 PID 4804 wrote to memory of 2984 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 83 PID 4804 wrote to memory of 2984 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 83 PID 4804 wrote to memory of 4500 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 85 PID 4804 wrote to memory of 4500 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 85 PID 4804 wrote to memory of 4500 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 85 PID 4804 wrote to memory of 3400 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 86 PID 4804 wrote to memory of 3400 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 86 PID 4804 wrote to memory of 3400 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 86 PID 4804 wrote to memory of 3464 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 87 PID 4804 wrote to memory of 3464 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 87 PID 4804 wrote to memory of 3464 4804 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 87 PID 2984 wrote to memory of 1296 2984 cmd.exe 91 PID 2984 wrote to memory of 1296 2984 cmd.exe 91 PID 2984 wrote to memory of 1296 2984 cmd.exe 91 PID 1296 wrote to memory of 3732 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 92 PID 1296 wrote to memory of 3732 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 92 PID 1296 wrote to memory of 3732 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 92 PID 3732 wrote to memory of 3580 3732 cmd.exe 94 PID 3732 wrote to memory of 3580 3732 cmd.exe 94 PID 3732 wrote to memory of 3580 3732 cmd.exe 94 PID 1296 wrote to memory of 3608 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 95 PID 1296 wrote to memory of 3608 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 95 PID 1296 wrote to memory of 3608 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 95 PID 1296 wrote to memory of 4812 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 99 PID 1296 wrote to memory of 4812 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 99 PID 1296 wrote to memory of 4812 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 99 PID 1296 wrote to memory of 4632 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 96 PID 1296 wrote to memory of 4632 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 96 PID 1296 wrote to memory of 4632 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 96 PID 1296 wrote to memory of 2744 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 101 PID 1296 wrote to memory of 2744 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 101 PID 1296 wrote to memory of 2744 1296 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 101 PID 3580 wrote to memory of 5052 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 103 PID 3580 wrote to memory of 5052 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 103 PID 3580 wrote to memory of 5052 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 103 PID 5052 wrote to memory of 4324 5052 cmd.exe 105 PID 5052 wrote to memory of 4324 5052 cmd.exe 105 PID 5052 wrote to memory of 4324 5052 cmd.exe 105 PID 3580 wrote to memory of 3456 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 106 PID 3580 wrote to memory of 3456 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 106 PID 3580 wrote to memory of 3456 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 106 PID 3580 wrote to memory of 1304 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 107 PID 3580 wrote to memory of 1304 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 107 PID 3580 wrote to memory of 1304 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 107 PID 3580 wrote to memory of 1148 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 112 PID 3580 wrote to memory of 1148 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 112 PID 3580 wrote to memory of 1148 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 112 PID 2744 wrote to memory of 3960 2744 cmd.exe 110 PID 2744 wrote to memory of 3960 2744 cmd.exe 110 PID 2744 wrote to memory of 3960 2744 cmd.exe 110 PID 3580 wrote to memory of 1948 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 109 PID 3580 wrote to memory of 1948 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 109 PID 3580 wrote to memory of 1948 3580 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 109 PID 4324 wrote to memory of 2560 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 115 PID 4324 wrote to memory of 2560 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 115 PID 4324 wrote to memory of 2560 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 115 PID 4324 wrote to memory of 2724 4324 4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe 117 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe"C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\sawMUsUE\tsgYgwkI.exe"C:\Users\Admin\sawMUsUE\tsgYgwkI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4872
-
-
C:\ProgramData\KisMkgoI\OycIYwYw.exe"C:\ProgramData\KisMkgoI\OycIYwYw.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"2⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"4⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"6⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"8⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee19⤵
- Suspicious behavior: EnumeratesProcesses
PID:796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"10⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee111⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"12⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee113⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"14⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee115⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"16⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee117⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"18⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee119⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"20⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee121⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"22⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee123⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"24⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee125⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"26⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee127⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"28⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee129⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"30⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee131⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"32⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee133⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"34⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee135⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"36⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee137⤵PID:564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"38⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee139⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"40⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee141⤵PID:1460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"42⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee143⤵PID:4424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"44⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee145⤵PID:3192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"46⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee147⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"48⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee149⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"50⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee151⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"52⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee153⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"54⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee155⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"56⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee157⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"58⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee159⤵PID:3780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"60⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee161⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"62⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee163⤵PID:3772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"64⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee165⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"66⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee167⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"68⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee169⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"70⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee171⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"72⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee173⤵PID:3752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"74⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee175⤵PID:1380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"76⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee177⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"78⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee179⤵PID:4060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"80⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee181⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"82⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee183⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"84⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee185⤵PID:4100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"86⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee187⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"88⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee189⤵
- Modifies visibility of file extensions in Explorer
PID:1444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"90⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee191⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"92⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee193⤵PID:2752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"94⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee195⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"96⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee197⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"98⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee199⤵
- Modifies visibility of file extensions in Explorer
PID:5116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"100⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1101⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"102⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1103⤵PID:3696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"104⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1105⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"106⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1107⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"108⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1109⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"110⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1111⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"112⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1113⤵PID:3992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"114⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1115⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"116⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1117⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"118⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1119⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"120⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1.exeC:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1121⤵PID:4768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4dc8a9e492072b41f29c8f80c303f88b3ed98cc35b2ba641d7dcfa7b8aafaee1"122⤵PID:3340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-