Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe
Resource
win10v2004-20220901-en
General
-
Target
e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe
-
Size
542KB
-
MD5
8474d3bfa94cf0503791e95995d5ed90
-
SHA1
c6f2268051897fc2d870001f1a9cc07ebfa14a59
-
SHA256
e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f
-
SHA512
969f212c08a6688082505b6c7b85ccbff07737ff89f767f7c587e2f4db9ba009fc9c1d67b8c8fa35826cede1791d338f8c9d69c32793cb203cf8aa70c8f17fa4
-
SSDEEP
12288:a5ZPbEtyeBMBukT+68lEeQOX/Y6TP6oC1Y0+J52IiyXTNug4ZmZTHRvHws8qaZEP:a5ZQtXBW7y3lTNvYaMKfn2FugDAFVHww
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 63 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 388 VkoIEUUU.exe 2024 oYMoIcAg.exe 4012 BEUYAQMM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation oYMoIcAg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VkoIEUUU.exe = "C:\\Users\\Admin\\dicEYMEY\\VkoIEUUU.exe" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oYMoIcAg.exe = "C:\\ProgramData\\CIsEYsEg\\oYMoIcAg.exe" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VkoIEUUU.exe = "C:\\Users\\Admin\\dicEYMEY\\VkoIEUUU.exe" VkoIEUUU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oYMoIcAg.exe = "C:\\ProgramData\\CIsEYsEg\\oYMoIcAg.exe" oYMoIcAg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oYMoIcAg.exe = "C:\\ProgramData\\CIsEYsEg\\oYMoIcAg.exe" BEUYAQMM.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheUnregisterFind.wma oYMoIcAg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\dicEYMEY BEUYAQMM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\dicEYMEY\VkoIEUUU BEUYAQMM.exe File created C:\Windows\SysWOW64\shell32.dll.exe oYMoIcAg.exe File opened for modification C:\Windows\SysWOW64\sheSelectRestore.mpg oYMoIcAg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3120 reg.exe 4120 reg.exe 204 reg.exe 2548 reg.exe 4436 reg.exe 2768 reg.exe 2432 reg.exe 4080 reg.exe 4828 reg.exe 4560 reg.exe 2008 reg.exe 5104 reg.exe 3288 reg.exe 2688 reg.exe 1492 reg.exe 3020 reg.exe 4132 reg.exe 2220 reg.exe 4328 reg.exe 32 reg.exe 808 reg.exe 3012 reg.exe 4628 reg.exe 4440 reg.exe 64 reg.exe 4484 reg.exe 3304 reg.exe 3120 reg.exe 5080 reg.exe 868 reg.exe 2964 reg.exe 1488 reg.exe 4092 reg.exe 5068 reg.exe 4172 reg.exe 1904 reg.exe 4544 reg.exe 3888 reg.exe 3204 reg.exe 1088 reg.exe 4488 reg.exe 2220 reg.exe 2856 reg.exe 744 reg.exe 3580 reg.exe 4668 reg.exe 3708 reg.exe 1904 reg.exe 928 reg.exe 3008 reg.exe 4852 reg.exe 4828 reg.exe 2044 reg.exe 1272 reg.exe 3928 reg.exe 1348 reg.exe 1692 reg.exe 1088 reg.exe 1316 reg.exe 3924 reg.exe 1928 reg.exe 3120 reg.exe 4972 reg.exe 2016 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 5104 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 5104 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 5104 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 5104 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4480 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4480 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4480 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4480 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3472 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3472 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3472 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3472 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3888 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3888 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3888 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3888 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2752 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2752 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2752 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2752 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2868 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2868 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2868 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 2868 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1580 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1580 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1580 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1580 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3204 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3204 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3204 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3204 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4224 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4224 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4224 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4224 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1108 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1108 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1108 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 1108 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 3124 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4856 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4856 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4856 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 4856 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 oYMoIcAg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe 2024 oYMoIcAg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 388 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 84 PID 1336 wrote to memory of 388 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 84 PID 1336 wrote to memory of 388 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 84 PID 1336 wrote to memory of 2024 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 85 PID 1336 wrote to memory of 2024 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 85 PID 1336 wrote to memory of 2024 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 85 PID 1336 wrote to memory of 1980 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 87 PID 1336 wrote to memory of 1980 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 87 PID 1336 wrote to memory of 1980 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 87 PID 1980 wrote to memory of 2840 1980 cmd.exe 89 PID 1980 wrote to memory of 2840 1980 cmd.exe 89 PID 1980 wrote to memory of 2840 1980 cmd.exe 89 PID 1336 wrote to memory of 3752 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 90 PID 1336 wrote to memory of 3752 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 90 PID 1336 wrote to memory of 3752 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 90 PID 1336 wrote to memory of 3436 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 94 PID 1336 wrote to memory of 3436 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 94 PID 1336 wrote to memory of 3436 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 94 PID 1336 wrote to memory of 1704 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 92 PID 1336 wrote to memory of 1704 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 92 PID 1336 wrote to memory of 1704 1336 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 92 PID 2840 wrote to memory of 4008 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 96 PID 2840 wrote to memory of 4008 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 96 PID 2840 wrote to memory of 4008 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 96 PID 2840 wrote to memory of 3120 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 98 PID 2840 wrote to memory of 3120 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 98 PID 2840 wrote to memory of 3120 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 98 PID 2840 wrote to memory of 3304 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 100 PID 2840 wrote to memory of 3304 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 100 PID 2840 wrote to memory of 3304 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 100 PID 2840 wrote to memory of 4240 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 105 PID 2840 wrote to memory of 4240 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 105 PID 2840 wrote to memory of 4240 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 105 PID 2840 wrote to memory of 4420 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 101 PID 2840 wrote to memory of 4420 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 101 PID 2840 wrote to memory of 4420 2840 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 101 PID 4008 wrote to memory of 4356 4008 cmd.exe 106 PID 4008 wrote to memory of 4356 4008 cmd.exe 106 PID 4008 wrote to memory of 4356 4008 cmd.exe 106 PID 4420 wrote to memory of 2720 4420 cmd.exe 107 PID 4420 wrote to memory of 2720 4420 cmd.exe 107 PID 4420 wrote to memory of 2720 4420 cmd.exe 107 PID 4356 wrote to memory of 1288 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 108 PID 4356 wrote to memory of 1288 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 108 PID 4356 wrote to memory of 1288 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 108 PID 4356 wrote to memory of 3620 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 110 PID 4356 wrote to memory of 3620 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 110 PID 4356 wrote to memory of 3620 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 110 PID 4356 wrote to memory of 1904 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 111 PID 4356 wrote to memory of 1904 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 111 PID 4356 wrote to memory of 1904 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 111 PID 4356 wrote to memory of 3208 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 112 PID 4356 wrote to memory of 3208 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 112 PID 4356 wrote to memory of 3208 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 112 PID 4356 wrote to memory of 4924 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 116 PID 4356 wrote to memory of 4924 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 116 PID 4356 wrote to memory of 4924 4356 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 116 PID 1288 wrote to memory of 5104 1288 cmd.exe 118 PID 1288 wrote to memory of 5104 1288 cmd.exe 118 PID 1288 wrote to memory of 5104 1288 cmd.exe 118 PID 4924 wrote to memory of 4940 4924 cmd.exe 119 PID 4924 wrote to memory of 4940 4924 cmd.exe 119 PID 4924 wrote to memory of 4940 4924 cmd.exe 119 PID 5104 wrote to memory of 3292 5104 e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe 120 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe"C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\dicEYMEY\VkoIEUUU.exe"C:\Users\Admin\dicEYMEY\VkoIEUUU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:388
-
-
C:\ProgramData\CIsEYsEg\oYMoIcAg.exe"C:\ProgramData\CIsEYsEg\oYMoIcAg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"4⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"6⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"8⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"10⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"12⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"14⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"16⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"18⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"20⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"22⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"24⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"26⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"28⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"30⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"32⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f33⤵PID:3820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"34⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f35⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"36⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f37⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"38⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f39⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"40⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f41⤵PID:2476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"42⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f43⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"44⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f45⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"46⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f47⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"48⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f49⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"50⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f51⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"52⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f53⤵
- Modifies visibility of file extensions in Explorer
PID:1088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"54⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f55⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"56⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f57⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"58⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f59⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"60⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f61⤵PID:2392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"62⤵
- Modifies visibility of file extensions in Explorer
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f63⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"64⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f65⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"66⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f67⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"68⤵PID:4488
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f69⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"70⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f71⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"72⤵PID:2476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f73⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"74⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f75⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"76⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f77⤵PID:2076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"78⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f79⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"80⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f81⤵PID:3988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"82⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f83⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"84⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f85⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"86⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f87⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"88⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f89⤵PID:1980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"90⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f91⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"92⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f93⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"94⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f95⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"96⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f97⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"98⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f99⤵PID:608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"100⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f101⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"102⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f103⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"104⤵
- Modifies visibility of file extensions in Explorer
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f105⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"106⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f107⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"108⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f109⤵PID:4540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"110⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f111⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"112⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f113⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"114⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f115⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"116⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f117⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:4220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"118⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f119⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"120⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f.exeC:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f121⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e0503657edff47af6c9bb45750bf8ce22e30119ccee49b99636267342ce4756f"122⤵PID:4560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-